HIT Consultant Insightful coverage of healthcare innovation
 

individual

Results 76 - 100 of 494Sort Results By: Published Date | Title | Company Name
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise
    
Box
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : 
visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
If you’re looking to improve sales performance, optimize ecommerce, implement marketing automation, expand social media, deliver better customer service, or utilize accurate Configure-Price-Quote (CPQ) – it’s all Oracle. And, the icing on the cake? All of these solutions are integrated, but modular. We offer a breadth of solutions that you can not only buy individually, but can also easily integrate with existing or additional solutions as your business needs grow. Adapt your customer experience strategy to new technology in Forrester's navigate the future of CRM in 2017 Report.
Tags : 
mobile, artificial intelligence, chatbots, internet of things, integrated suite, cloud solutions
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: SAP     Published Date: Aug 22, 2018
Understanding and targeting customers is more important than ever before given the demand for individualized products, same-day or even one-hour delivery, and renting a service rather than buying a product.
Tags : 
sap, digital supply chain, supply chain management, supplier ecosystems, productivity
    
SAP
Published By: ADP     Published Date: Aug 28, 2017
The age of one-size-fits-all HR is over. Learn how to find the right HR solution for you and your individual business needs.
Tags : 
    
ADP
Published By: Wasabi     Published Date: Oct 23, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
wasabi, cloud storage, data storage, storage solutions
    
Wasabi
Published By: Monetate     Published Date: Oct 11, 2018
Monetate Intelligent Recommendations is the only solution that gives merchandisers & digital marketers the power to show contextually relevant product recommendations without burdening IT resources. Using manually curated or algorithmically-driven recommendations, marketers can easily support even the most complex product catalogs. Our solution filters recommendations based on customer attributes (e.g. shirt size), longitudinal behaviours (e.g. browsing behaviour), and situational context (e.g. product inventory at local stores). Best of all, an orchestration layer intelligently selects which algorithms and which filters to apply in any given situation, for any particular individual.
Tags : 
    
Monetate
Published By: Monetate     Published Date: Oct 22, 2018
Monetate Intelligent Recommendations automates recommendations at scale without sacrificing any of the control you require. Our proprietary algorithms know what to serve each individual shopper to maximise brand value, while still allowing the control of an unlimited number of business guardrails defined by you.
Tags : 
monetate, intelligent, recommendations, business, individual, automation
    
Monetate
Published By: Salsify     Published Date: Mar 15, 2019
Branded product pages on the digital shelf have become incredibly important both as a sales and marketing channel. For that reason, most brands are putting time and resources into improving the content of their product pages. But how exactly does content impact the numbers every business relies on? Read this report to get deep statistical insights on how product page content impacts search ranking, online market share, and sales overall. This study includes a range of analyses to help you quantify the actual sales value of your brand's product content using a variety of methodologies, including: An analysis of more than 500,000 Amazon search results pages A full-year examination of 60,000 Amazon product pages across 78 brands working with Salsify Data and stories from individual Salsify customers that invested in product content optimization Salsify is the product experience management platform for thousands of brands and retailers worldwide.
Tags : 
    
Salsify
Published By: McAfee APAC     Published Date: Jun 25, 2019
i. How automation and integration can work together to unify people, process, and technology. The security community has begun to embrace automation as a solution to handling tedious, repetitive tasks, allowing skilled staff to focus on more strategic and advanced endeavors. As destructive threats continue to increase, automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue. This SANS survey explores some of the misconceptions and facts around automation and how it can become a natural extension of individuals and teams trying to do their day jobs more effectively.
Tags : 
    
McAfee APAC
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
As a B2B Marketer, you spend a lot of your time coming up with new ways to reach the right prospect, at the right time, with the right message. Account-Based Marketing (ABM) is a tried-and-true strategy to help you do all three. By treating each account as a market of one, you can deepen your relationships with individuals at key accounts and ultimately increase revenue. For more ways ABM can help you up your marketing game, download this eBook.
Tags : 
    
Oracle Marketing Cloud
Published By: SAP EMEA Global     Published Date: Dec 06, 2017
In an era of morphing business models, and even fundamental shifts in the way capitalism is practiced around the world, no universal formula can guarantee a CFO’s success. Every country, every sector, and every organization dictates its own parameters for how an individual finance function operates. Nevertheless, our research demonstrates a clear correlation between strong finance leadership and strong enterprise performance— regardless of geography, industry, or company size.
Tags : 
finance, performance, efficiency, risk management, productivity, banking, retail, consumer products, utilities
    
SAP EMEA Global
Published By: Pure Storage     Published Date: Oct 09, 2017
Digital technology has arguably been the biggest disruptor for individuals and organisations in the last twenty years. It has changed how we communicate, how we shop, how we spend our time and how we develop and grow our businesses. For businesses, digital has not just created new products and services, but fundamentally shifted business models and the dynamic between business and customer, business and supplier, business and employee. It has become a significant force for value and revenue creation, but one that brings with it many challenges.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Pure Storage
Published By: Aerohive     Published Date: Jun 01, 2015
Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: Quest Software     Published Date: Feb 06, 2013
This document will highlight how these individual components are impacting service organizations and track the progress of convergence of these three components on the IT infrastructures of service organizations.
Tags : 
service, organizations, it infrastructure, service, mobility, field service, communication, collaboration, investments, progress
    
Quest Software
Published By: ClickSoftware     Published Date: Feb 07, 2013
This document will highlight how these individual components are impacting service organizations and track the progress of convergence of these three components on the IT infrastructures of service organizations.
Tags : 
service, organizations, it infrastructure, service, mobility, field service, communication, collaboration, investments, progress
    
ClickSoftware
Published By: Oracle     Published Date: Nov 02, 2016
This Executive Report illustrates how you can empower your staff and deliver more individualised guest experiences with mobile devices today.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 28, 2017
For the hospitality industry, it’s an important question that needs unequivocal answers. After all, millennials, comprising individuals born between 1981 and the late 1990s, now represent the largest generational demographic in the U.S. With a population of 83 million, they outnumber baby boomers and Generation Xers, and wield enormous spending clout – an estimated $200 billion annually. A hefty share of that pie is earmarked for hospitality: 77% of U.S. millennials say they visit a restaurant once a week or more, and each millennial is projected to spend an average of $3,900 on travel this year.*
Tags : 
millennials, hospitality, restaurant, food, service, oracle
    
Oracle
Published By: Aon Hewitt     Published Date: Jan 20, 2015
Today in the United States, employer-sponsored health benefits are the source of coverage for more than 149 million individuals.1 Fueled by many factors, including rising costs, legislative changes, new provider models, and evolving market forces, the health care industry is undergoing a transformation. And as health care evolves, so must the employer’s role in it. What has not changed, however, is employers’ belief that health benefits are a key differentiator for talent. In fact, most large employers plan to continue offering coverage in spite of the uncertainties in the health care market.2 To keep pace with the changing environment, employers must rethink their role in health coverage: how they sponsor, structure, and deliver health benefits, and how they manage costs while keeping employees healthy, productive, and satisfied.
Tags : 
aon, health care strategy, health benefits, health care industry, employee benefits, market forces, legislative changes
    
Aon Hewitt
Published By: blueconic     Published Date: May 22, 2014
The individual customer central in all online communication
Tags : 
online engagement, cross channel marketing, real-time marketing, inbound marketing
    
blueconic
Published By: McAfee     Published Date: Jan 20, 2015
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation
    
McAfee
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.