HIT Consultant Insightful coverage of healthcare innovation
 

businesses

Results 301 - 325 of 2244Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Feb 14, 2019
Like businesses of all sizes, midmarket firms have an ongoing need to stimulate innovation and improve quality. Midmarket firms need to balance these requirements against a backdrop of limited scale, rapid market change and constraints on resources that can be dedicated to shaping the future, rather than reacting to the demands of the present. This Proaction Series report, commissioned by Dell, will address technologies best able to empower scarce resources as they help set new benchmarks for business performance. Download this report from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Sage EMEA     Published Date: Jan 29, 2019
Sage pays close attention to what your business demands For nearly 40 years, Sage has followed through on its founding commitment: Making sure we deliver what our customers need. That dedication has helped us become one of the world’s largest suppliers of enterprise management solutions, used by more than 3 million businesses of all types and sizes around the world. Sage helps drive today’s business builders with a new generation of solutions to manage everything from money to people wherever they’re needed, offering the freedom to work with mobility. Above all else, we’re driven to satisfy our customers and keep them coming back. That commitment has paid off. We beat SAP (19), Oracle (25) and Microsoft (34) with our Net Promoter Score (NPS)—a respected customer-satisfaction, customer-experience, and loyalty indicator widely used by Fortune 500 companies. The industry NPS average is 31.75, meaning we are 58% better than the average, and 88% above our closest competition. It shows t
Tags : 
    
Sage EMEA
Published By: Oracle     Published Date: Nov 08, 2017
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. Explanation of the Oracle IaaS solutions and cases studies.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Cisco     Published Date: Sep 14, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: CA Technologies     Published Date: Mar 21, 2014
This study of 1,300 senior IT decision-makers worldwide proves IT leaders recognize they must change how their organizations work to accelerate time to market, improve software quality, speed application development and meet growing customer demand.
Tags : 
devops, software, it automation, visualization, application
    
CA Technologies
Published By: Oracle     Published Date: Nov 27, 2017
Customer service has an opportunity to be a much more strategic weapon for businesses that understand its power. To do this means moving away from what has traditionally been viewed as a back-end operation and cost center to what is now being viewed as a brand-focused profit center. The primary driver of this sea change is engaged and empowered consumers, who want to get the answers to their questions anytime, anywhere, on any device they choose.
Tags : 
communications, telecom, financial services, insurance, technology, retail, wholesale distribution, manufacturing, discrete, consumer goods
    
Oracle
Published By: Bazaarvoice     Published Date: May 23, 2013
Digitally, consumers today share knowledge and self-organize online, seizing more collective power than ever. This is the connected economy, where consumers rule. Learn the four trends businesses must learn to succeed in their reign.
Tags : 
consumer demands, branding, consumer engagement
    
Bazaarvoice
Published By: Gate2Shop     Published Date: Jan 28, 2011
Due to the constantly changing global online payment landscape, online businesses of all sizes need payment solutions that can be easily adapted to their needs. E-commerce providers must take a step ahead and continue to add more innovative features to the continuously growing portfolio of e-commerce solutions. Are you making it easy for your customer to purchase?
Tags : 
gate2shop, ecommerce service provider, online payment, e-commerce solution, compliance, pci, data security standard of visa
    
Gate2Shop
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
The report shows a link between greater autonomy and business performance. It also highlights the increasing alignment between IT and the business on the risks and benefits of providing greater technology choice for users. Highlighted findings include: • The fastest growing companies in the world believe that greater technology choice can increase revenue and profits by more than 35 percent • 84 percent of businesses worldwide believe that greater technology choice is crucial to driving efficiency in the future • 72 percent of businesses see security as the biggest barrier to greater technology choice
Tags : 
technology, autonomy, business
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.
Tags : 
idc, security, bluecoat, web security, hackers
    
Blue Coat Systems
Published By: Red Hat     Published Date: Dec 09, 2013
Businesses are tapping into the innovative potential of their companies with Red Hat Enterprise Linux. Standardize your enterprise platform across multiple hardware architectures, hypervisors and cloud providers to help IT meet the needs of your business.
Tags : 
red hat, data, mobile, cloud, it congestion, deliver flexibility, business expectations, disparate hardware
    
Red Hat
Published By: Avaya     Published Date: Feb 06, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
    
Avaya
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Pega     Published Date: May 24, 2016
Customers are evolving. They are evolving in the way they get information about products, what goes into making their purchase decision and ultimately how they buy. Businesses need to evolve and adapt how they manage their customer relationships. Customer Relationship Management (CRM) software was supposed to improve front-end customer engagement across marketing, sales and service. Unfortunately, most systems have the opposite result. Companies spend too much time integrating and maintaining disconnected systems and too little time nurturing relationships. Organizations need to transform their organizations from the inside out—embracing new processes and technologies that gathers, stores and gives them access to customer data so they gain more insight into their customers and therefore create more effective marketing and service programs. Download this Ebook and gain a better understanding of how a more robust CRM system can improve customer management.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
Customer service professionals know better than anyone how fast the world is changing. New channels, new technologies and sky-high customer expectations are pushing your organization to be more agile, flexible and scalable than ever. There are critical things that your customer service apps need to be able to do in order to create a 360-degree professional service organization. Download this E-book and discover the 5 key actions organizations need to take to help businesses meet and surpass customer expectations.
Tags : 
    
Pega
Published By: FusionOps     Published Date: Jun 27, 2016
The term Industry 4.0 presupposes the passing of three major shifts in how businesses approached manufacturing throughout modern history, tracing its roots as far back as the 19th century: Industry 1.0: The Industrial Revolution redefines human limitations by harnessing the power of water and steam. Industry 2.0: Electricity pushes people and machines even further as manufacturing grows in scale and scope. Industry 3.0: The modern computer opens the door for automation
Tags : 
    
FusionOps
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
IT services such as mobile devices, smart applications and cloud-based services are transforming the way we live, work and communicate. Global technology services and businesses are embracing digital transformation, introducing Intelligent Spaces to unleash worker productivity and accelerate the pace of business. The workplace plays a critical role in an organization’s digital transformation. Forward-looking organizations recognize that you can’t build a digital business without building a digital workplace.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.