HIT Consultant Insightful coverage of healthcare innovation
 

fundamental

Results 176 - 200 of 455Sort Results By: Published Date | Title | Company Name
Published By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
    
OneLogin
Published By: Riverbed     Published Date: Sep 05, 2014
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services.
Tags : 
application, performance, management, tool set, enterprises, fundamental issues
    
Riverbed
Published By: Adobe     Published Date: Jun 29, 2012
Customers and employees are becoming increasingly empowered by social technologies. This change is dramatically changing the way they communicate and collaborate. Find out how to succeed in this new social world by making fundamental changes to resources, skills, tools, processes, and culture.
Tags : 
marketing, forrester, social media, digital marketing, emerging marketing, social maturity
    
Adobe
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies
    
Riverbed
Published By: Riverbed     Published Date: Aug 15, 2013
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Download now to find the results!
Tags : 
apm, riverbed, network performance, application performance, infrastrucure, forrester report, business performance, it survey, network management, customer service
    
Riverbed
Published By: Adaptive Planning     Published Date: Apr 18, 2011
This webinar features real-world case studies from software companies that have fundamentally transformed their planning and reporting.
Tags : 
adaptive planning, fp&a, software companies, planning, reporting, strategic value, performance evaluation, monthly variance report, company strategy, revenue growth
    
Adaptive Planning
Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: IBM     Published Date: Sep 15, 2014
Application release and deployment practices are the backbone of the DevOps movement. Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk. Improve software deployment in your organization through innovative automation methods!
Tags : 
application release, deployment practices, software development, software delivery products
    
IBM
Published By: IBM     Published Date: Jul 09, 2015
Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk.
Tags : 
application release, application deployment, devops, software delivery, automating applications, best practices, reliable deployment process, innovative automation methods
    
IBM
Published By: Catalyst SF     Published Date: May 05, 2008
This white paper is designed to provide the marketing generalist with the basics of the gaming industry and how to leverage game marketing tools to improve marketing effectiveness. It is not designed for a gaming expert but rather for the person who is curious about the space, believes that game marketing may have value for their brand, but is not well versed in the opportunities available or the dynamics of the industry.
Tags : 
game, gaming, video game, video gamings, catalyst, catalyst sf, game marketing
    
Catalyst SF
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: VMware     Published Date: Oct 02, 2018
Digital disruption is fundamentally changing IT. Today’s organizations are under more pressure than ever to innovate fast and offer a superior experience to every customer. In this white paper, we explore the advantages that a modernized data center can bring for IT organizations seeking to keep pace in a dynamic environment, and how a software-defined approach can help move them forward. Real-world examples showcase how VMware is enabling IT teams to develop future-proof strategies with a foundation that is ready for cloud environments as well as global expansion and customer acquisitions. Submit the form to read this latest whitepaper to discover the advantages and how you could develop a future-proof strategy with VMware.
Tags : 
    
VMware
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Badgeville     Published Date: Feb 13, 2014
Game applications in business result in both long and short-term success. Short-term effects will occur quickly, while proper implementation and use of game psychology will enable business leaders to maintain this success in the long-term. Gain valuable insights into both long and short-term gamification success from these industry visionaries, and learn how to harness the power of games to fundamentally change the nature of work.
Tags : 
gamfiication, gamify, engagement, bunchball, gigya, big door, loyalty, productivity, learning, salesforce, sales, crm, oracle, sharepoint, support, service, compliance, adoption, game
    
Badgeville
Published By: Datastax     Published Date: May 14, 2018
The data management practices of old will no longer work. If you’re still trying to use a centralized approach, you are probably finding it difficult to keep up with the real-time demands of the Right-Now Economy. This special Gartner report describes the main drivers for modernizing data management — operational efficiency and analytics — and explains why balancing connecting data with collecting data will be a fundamental requirement for modern data management moving forward.
Tags : 
    
Datastax
Published By: ServiceNow     Published Date: Oct 11, 2017
For years, companies have used CRM as the software of choice to manage customer engagement and information, in an attempt to deliver a great customer experience. Managing the front end of the engagement process is important. However, delivering proactive customer service – that prevents and resolves issues – requires much more than that. At ServiceNow, we believe that it is time to rethink the fundamentals of CRM and customer service and we invite you to explore the new strategies, processes, and technology presented in this toolkit. Doing so will enable your customer service teams to connect seamlessly with other departments and deliver the effortless and proactive service experience your customers expect. We hope you find the collection of research reports and whitepapers valuable.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 11, 2017
Delivering world-class customer service is possible when IT engages the entire enterprise in the design of products, services and technologies. Our research helps IT and lines of business to establish goals, objectives and projects to provide exceptional service with the customer in mind.
Tags : 
    
ServiceNow
Published By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, you’ll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: • How to view GDPR as an opportunity, and how you can build on it • Article 32 – a core part of the security principle • Data subject rights • Key players and responsibilities • And much more
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: TIBCO Software     Published Date: Mar 12, 2019
Fraud affects more than just your customers, it fundamentally destroys your reputation and has significant impact on your bottom line. In the first half of 2018, financial fraud from payment cards, cheques and remote banking totaled £358m in the UK alone, resulting from over a million incidents, an increase of more that 50% over the last 4 years. Have a look at this interesting Infographic to find out more.
Tags : 
fraud, fraud prevention, uk fraud, fraud detection, machine learning
    
TIBCO Software
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Workday     Published Date: Jul 30, 2019
Aligning your workforce plan to greater business objectives doesn’t have to be a struggle—especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : 
    
Workday
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Over the last couple of years SD-WAN technology has matured into a mainstream solution. Yet, the most appropriate migration path is not always clear. While there are many considerations to balance during a migration, the enduring benefit of an SD-WAN architecture is simplification: branch design, data center design, routing, edge platform choices, security choices, management. To ensure an understanding of the fundamental concepts, let’s quickly discuss the architecture and components of SD-WAN, and then move on to cover the best practices of various aspects of an SD-WAN migration
Tags : 
    
VMware SD-WAN by VeloCloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.