HIT Consultant Insightful coverage of healthcare innovation
 

cis

Results 401 - 425 of 3972Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Apr 23, 2018
The experience is your product. In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read 'The Path of Experience' to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: – The role of dynamic merchandising in engaging customers – Steps to create compelling customer experiences using audience segmentation and personalization – Ways to scale customer experiences to create powerful connections, no matter the device or channel
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 20, 2017
With the growing size and importance of information stored in today’s databases, accessing and using the right information at the right time has become increasingly critical. Real-time access and analysis of operational data is key to making faster and better business decisions, providing enterprises with unique competitive advantages. Running analytics on operational data has been difficult because operational data is stored in row format, which is best for online transaction processing (OLTP) databases, while storing data in column format is much better for analytics processing. Therefore, companies normally have both an operational database with data in row format and a separate data warehouse with data in column format, which leads to reliance on “stale data” for business decisions. With Oracle’s Database In-Memory and Oracle servers based on the SPARC S7 and SPARC M7 processors companies can now store data in memory in both row and data formats, and run analytics on their operatio
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: DocuSign UK     Published Date: Nov 06, 2018
"With every week that passes, our dependency on paper wanes as digital processes are introduced into every aspect of our daily activity. If you want to sign a contract, book a restaurant or make a bank transfer, you can do so digitally – it is ingrained in our lives. Taking an entire business digital can be more challenging and reliant on many more moving parts. Identifying how businesses are evolving to meet these rapidly changing demands is essential for decision makers across all sectors of the economy to prepare their organisation or department accordingly to undertake successful digital transformations. This eBook investigates digital expectations from both the consumer and business perspectives. It identifies what action is being taken to meet the demand in the market and where the main challenges lie for businesses that are trying to deliver the digital experience their customers want."
Tags : 
    
DocuSign UK
Published By: Codility     Published Date: Dec 08, 2017
When you’re hiring, you need your screening process to provide reliable insights—and spotlight the best candidates in your pipeline—so you can make informed recruiting decisions. Ideally, you’re able to gather this crucial information quickly and efficiently, at scale, while simultaneously creating a great candidate experience.
Tags : 
    
Codility
Published By: Infosys     Published Date: May 30, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : 
data, fortress, modernize, business, applications, telecom
    
Infosys
Published By: Dell EMC     Published Date: Nov 26, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape. Learn more about Dell Precision® workstations featuring Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 26, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape. Learn more about Dell Precision® workstations featuring Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: IBM APAC     Published Date: Apr 27, 2018
To make the best treatment decisions, doctors at Memorial Hermann required rapid, reliable access to patients medical records and fast insight into changing health indicators. Deploying IBM FlashSystem, physicians at Memorial Hermann can now rapidly access healthcare information and perform sophisticated analysis to identify early signs of illness and take appropriate action for patients 99% faster.
Tags : 
    
IBM APAC
Published By: TrendKite     Published Date: Jun 15, 2018
How can you plan more certainty into your PR practice? Break down silos, hone processes, and measure bottom-line business value. Public relations is entering an era of unprecedented challenge — and unprecedented opportunity. Digital technologies are rocking every boat, from consumer behaviors, to B2B decision-making, to the nature and reputation of media itself. Today, every discipline is being buffeted by continual change and performance pressure. But the convergence of key trends poses a particular set of challenges for public relations.
Tags : 
    
TrendKite
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: KPMG     Published Date: Nov 13, 2018
Read this to find out how we developed a decision-support tool to help a major transport operator use data and analytics to optimise commercial performance. Discover: what happens when humans are faced with complex decisions how data and analytics can be applied to improve decision making how a decision-support tool works in real life (video) what lessons your business can learn from this case story.
Tags : 
    
KPMG
Published By: Workplace by Facebook     Published Date: Sep 10, 2018
Body: Almost half of all retail purchasing journeys now involve a mobile device. This means shoppers have more choice, and exposure to more influencers that shape their buying decisions. Learn consumers are evolving and how tools like Workplace by Facebook can help overcome these new challenges in the retail industry.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook
Published By: T Systems     Published Date: Nov 19, 2018
If only there was a whitepaper that could explain how digitalization is changing the retail landscape while advising retailers on how they can embrace this driving force to excel in the industry. Here at T-Systems, we have produced a whitepaper that provides a detailed look into what is required for your retail business to succeed in the digital age. Our ‘Shaping Retail’s Future, Understanding & Delighting Customers in The Digital Era’ provides you with the means to safely navigate and prosper from the effect that digitization is having upon the industry. In a retail world that demands engaging with an ever more sophisticated level of consumer, those whom exhibit less brand loyalty year-on-year – the window for error has become decisively small. Our whitepaper enables your business to identify your digital needs for more effective retail operations by asking critical questions to reveal and plug your capability gaps. We examine the importance of developing the right omnichannel strateg
Tags : 
retail, sales, whitepaper, t-systems, omnichannel, data analytics, touchpoints, digitization, iot
    
T Systems
Published By: T Systems     Published Date: Nov 28, 2018
The wait is over. Here at T-Systems, we are proud to present the findings of CXP Group - a leading independent European research and advisory firm in the field of digital, software and IT services. Their new “Digital Industrial Transformation with the Internet of Things” report examines the dynamic range of opportunities that IoT holds for businesses and explores the challenges of integrating existing data processes with those that are IoT enabled. The report is the result of the feedback cultivated from interviews with senior business and IT decision-makers responsible for creating and running innovation strategies at 250 large-scale European manufacturers. The data has been disseminated by region, strategies, pain points, IoT adoption, intention, investment etc. and provides readers with a detailed examination of what industrial businesses look for most from IoT. The report provides a fascinating unearthing of influencing factors for IoT readiness and digitization as a whole. Using
Tags : 
industrial manufacture, iot, internet of things, iot adoption, european, digitization, digitization strategy, value chains, service providers, consultation, supply chain management, operational technology, data analytics, new business models
    
T Systems
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Dell DnCP     Published Date: Mar 21, 2019
This IDC InfoBrief, sponsored by Dell, outlines the key trends and priorities around FOW with a specific focus on displays. It also explains how displays are a critical component today for delivering superior experiences as well as for improving productivity and collaboration in the increasingly digitalized world. And to meet the FOW demands and prepare for the Industry 4.0 era, IT and business decision-makers need to rethink their display and monitor strategies.
Tags : 
    
Dell DnCP
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
En diciembre de 2017, Dell encargó a Forrester Consulting que elaborara un estudio para determinar cómo se estructuraban las organizaciones empresariales desde la perspectiva de los departamentos de TI. El estudio exploró dos tipos de organizaciones de TI, los controladores digitales y los transformadores digitales, y las tendencias y los retos del aprovisionamiento de los PC. A menudo, los controladores digitales se asocian con el enfoque en sentido descendente y la estructura lineal, y enfatizan la seguridad y la precisión. Por el contrario, los transformadores digitales se enfocan en la innovación y en la centralidad de los empleados y los clientes, y priorizan la velocidad y la flexibilidad. Mediante la comprensión de los dos grupos, las empresas pueden superar los retos que surgen de la gestión del ciclo de vida de los PC. Al invertir en las herramientas de gestión de PC existentes y asociarse con una empresa especializada en la implementación y la gestión de ordenadores, las comp
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Today’s IT leaders don’t have the time nor the resources to effectively respond to the needs of their ever-demanding workforce. It’s time for CIOs to stop running the IT department and start transforming the business; only through transforming the way in which they deploy and service the workforce can CIOs accomplish this paramount task. Organizations must now embrace a future that improves the workforce experience in order to offload cumbersome and time-intensive tasks. With IT becoming more integrated and a strategic partner to the lines of business (LOBs), offloading and embracing new technologies that enable employee experience is a logical step. In September 2018, Dell commissioned Forrester Consulting to evaluate the effectiveness of PC-as-a-service (PCaaS) and the appetite of organizations to use PCaaS. Forrester conducted five interviews with IT decision makers, with knowledge of desktop infrastructure, or those who had responsibility with PC life cycle services to explore this
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.