HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 51 - 75 of 639Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 10, 2016
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe stock, adobe creative cloud, cloud, integration
    
Adobe
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE has made a significant investment into AI and ML techniques that are embedded into its core workforce management solution, NICE WFM. Recent advancements include learning models that find hidden patterns in the historical data used to generate forecasts for volume and work time. NICE WFM also has an AI tool that determines, from a series of more than 40 models, which single model will produce the best results for each work type being forecasted. NICE has also included machine learning in its scheduling processes which are discussed at length in the white paper.
Tags : 
    
Nice Systems
Published By: IBM     Published Date: Aug 01, 2018
Your customers aren't the only ones who can benefit from advancing artificial intelligence (AI) support — your employees can, too. Chatbots help employees who service customers, and you can build them with mature AI components. But success requires a focus on tasks rather than job replacement as well as a cyborg-like division between human and machine tasks. This report helps infrastructure and operations (I&O) pros determine which tasks are best executed by people and which are best left to machines, with use cases describing how that looks.
Tags : 
    
IBM
Published By: VMware AirWatch     Published Date: Nov 12, 2015
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par AirWatch ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. AirWatch® by VMware® apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware® Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : 
airwatch, emm, office365, cloud
    
VMware AirWatch
Published By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : 
akamai, akamai gaming, infrastructure, distribution channel, technological advancements
    
Akamai Technologies
Published By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Avaya     Published Date: Dec 18, 2013
It is a business maxim that the more a company knows about its customers and what they want, the better its chances of providing them a positive, fulfilling experience. With today’s ubiquitous, convenient communications methods, particularly the use of mobile devices and networks, opportunities for rich customer interactions are flourishing. Whether their interest is pricing, store locations or product support, people increasingly expect information to be available wherever, whenever and however they want it.
Tags : 
avaya, cem, customer experience management, contact center, mobile, mobile devices, customer interactions
    
Avaya
Published By: Epson     Published Date: Dec 18, 2017
When it comes to display technology today, businesses tend to invest in flat panel TVs without much thought. But visual communication is an important element essential for success. When a new product is unveiled to a room of editors, when engineers analyze a circuit board, or when a teacher attempts to bring a classroom subject to life, visuals are as powerful as the spoken word, if not more. This paper offers insight on the state of visual display to ensure you make the right decision on your next investment, whether it’s a replacement, revamp, or remodel. Learn how to use and maintain visual display technology to make the greatest positive impact on your organization with the highest return of investment.
Tags : 
display technology, visual communication, virtual display, projectors
    
Epson
Published By: BizNet Software     Published Date: Jan 19, 2011
An Rx For Replacing FRx - 10 considerations that ensure your replacement becomes an improvement
Tags : 
frx, financial reporting, replacement, excel
    
BizNet Software
Published By: SAS     Published Date: Mar 06, 2018
The headlines and major company announcements share a common theme: Competitive disruption is reshaping business models and organizations’ very futures. Around the global automotive industry, component and original equipment manufacturers (OEMs) are taking a hard look at where their future growth will come from ? and it’s not all based on their core businesses. New technology has opened the door for new services and revenue streams.
Tags : 
    
SAS
Published By: HP     Published Date: Oct 15, 2014
Overcoming IT’s operational challenges based on infrastructure complexity is a serious issue.Not only is a piecemeal architecture difficult and inefficient to manage, but it is also very expensive when the Total Cost of Ownership is considered. Reducing that complexity not only frees up personnel but also budgetary resources. Converged Infrastructure offers the opportunity for organizations to drastically increase their IT and user productivity at a significantly lower TCO. Improved IT efficiency and agility accelerates time to value by a significant margin. See a simpler, more efficient infrastructure here.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
    
HP
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : 
application modernization, forrester consulting, apo, asg, application portfolio optimization
    
ASG Software Solutions
Published By: Oath     Published Date: Oct 31, 2017
Consumers are better than ever at differentiating between low-quality and premium content. For marketers, this means the placement of their ads is critically important. Brands can’t afford to risk appearing alongside questionable content, not with 75% of consumers holding brands accountable for their ad environments. When brands are shown adjacent to Oath’s trustworthy, premium content, they experience 5x greater favorability - a striking example of the power of positive associations and the importance of knowing your digital neighbors.
Tags : 
digital advertising, online advertising, ad placement, quality content, quality video content, online news, online video, offensive content
    
Oath
Published By: CA Technologies     Published Date: Sep 13, 2017
The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
Tags : 
    
CA Technologies
Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks.
Tags : 
application assurance, application quality, integration, application management, virtualization, mobility, storage virtualization, application delivery
    
VMTurbo
Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet
    
Astaro
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: Schneider Electric     Published Date: Nov 21, 2017
When effectively applied in a cement plant, automation and control technologies can significantly reduce energy expenses, while helping to increase production and reduce waste.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Box     Published Date: Jun 11, 2014
Midsize semiconductor manufacturer saves $0.5MM in infrastructure expenses by switching from servers to Box. They use Box company-wide: R&D, sales, M&A, legal, and more. Technology industry, manufacturing industry, midsize company, midmarket, NA, server replacement, Sales LOB, R&D LOB, M&A, Legal LOB, Box Content API, cost savings.
Tags : 
box, avago, technology, server replacement, lob, r&d, m&a, legal
    
Box
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft has made significant enhancements to the architecture of Microsoft Dynamics® CRM 4.0 to improve network performance. Test results demonstrate network bandwidth utilization improvements of up to 94%. Improvements were evaluated in the number of round trips, bytes sent, and bytes received. Because the bandwidth utilization associated with a page can change after the first time the page is loaded, both initial (cold) and subsequent (warm) page loads were tested.
Tags : 
microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: SAS     Published Date: May 24, 2018
Ongoing digitization has created vast streams of data, forcing businesses to become more data-driven than ever before. While the benefits of being a data-driven organization are clear (improved performance, more profitability, stronger innovations), there are still some technical and business challenges to overcome. Thanks to technological advancements in data analytics, companies in all types of industries can become data-driven. Read this e-book to discover what it means to be a data-driven organization and to learn the basic do’s and don’ts of how to get there.
Tags : 
    
SAS
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.