HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 1 - 25 of 943Sort Results By: Published Date | Title | Company Name
Published By: ttec     Published Date: Oct 16, 2019
In an age of tech-savvy customers and self-service channels, do companies still need to invest in contact centre and staff to provide support? The answer is, yes. Consumers have been trained to find the information they need on their own online or with their mobile device. But when they do pick up to the phone and reach out to customer service, they expect representatives to solve what are often complex questions. They expect human interactions. This enormous shift in which customer service representatives are perceived as a last resort puts increased pressure on contact centre associates who already have the odds stacked against them. The staff must be trained to quickly handle issues that frequently require access to a wide variety of information, but a lack of investment means many associates are often unprepared and lack the right resources to help customers. To change the outcome, customer service representatives need the right training and tools to not only understand the issue,
Tags : 
    
ttec
Published By: KPMG     Published Date: Oct 15, 2019
We’re seeing a global trend towards responsible investing. Increasingly, institutional investors are recognising the potential for ESG factors to affect the valuation and financial performance of the companies they invest in. At the same time, consumer demand for responsible investments is surging, especially from the younger generation. “Responsible” or “sustainable” finance and a focus on environmental, social and governance (ESG) factors have moved firmly into the mainstream today. This booklet presents the proof to address the issues around responsible investment implementation: statistics from across investment markets that show how significant this shift is.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
    
KPMG
Published By: InMoment     Published Date: Oct 14, 2019
In today’s experience economy, a simple request for feedback on a receipt is not enough to accurately determine your guests’ needs. Guests need to be presented with the option to share feedback at the right time for them—whenever, wherever, and however they want to. At the same time, the volume of feedback requests and the length of surveys often result in survey fatigue and other negative emotions in guests. This is just one of the complex issues restaurant brands find themselves facing today. Others include: • How do I understand the experience every individual guest has with my brand? • How do I communicate with them in a way that they’re more likely to give feedback? • How can I demonstrate awareness of the guests’ situations and acknowledge their needs?
Tags : 
    
InMoment
Published By: AWS     Published Date: Oct 09, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG
Published By: AWS     Published Date: Oct 07, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
While monitoring is critical for any business, it is especially imperative for highly regulated industries such as healthcare. With patient data to protect and regulatory standards to meet, you need to make sure your teams are building solutions that comply. If you’re not compliant, you need to be able to quickly remediate issues, so you can still get your products out to market and deliver better patient care.
Tags : 
    
AWS
Published By: ASME     Published Date: Oct 03, 2019
One of the most frustrating aspects of the measurement of severe pyroshock events is the acceleration offset that almost invariably occurs. Dependent on its magnitude, this can result in large, low-frequency errors in both shock response spectra (SRS) and velocity-based damage analyses. Fortunately, recent developments in accelerometer technology, signal conditioning, and data acquisition systems have reduced these errors significantly. Best practices have been demonstrated to produce offset errors less than 0.25% of Peak-Peak value in measured near-field pyrotechnic accelerations: a remarkable achievement. This paper will discuss the sensing technologies, including both piezoelectric and piezoresistive, that have come together to minimize these offsets. More important, it will document the many other potential contributors to these offsets. Included among these are accelerometer mounting issues, cable and connector sources, signal conditioning amplitude range/bandwidth, and digitizi
Tags : 
    
ASME
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: SiteImprove     Published Date: Oct 02, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove
Published By: ttec     Published Date: Oct 01, 2019
In an age of tech-savvy customers and self-service channels, do companies still need to invest in contact centers and staff to provide support? The answer is, yes. Consumers have been trained to find the information they need on their own online or with their mobile device. But when they do pick up to the phone and reach out to customer service, they expect representatives to solve what are often complex questions. They expect human interactions. This enormous shift in which customer service representatives are perceived as a last resort puts increased pressure on contact center associates who already have the odds stacked against them. The staff must be trained to quickly handle issues that frequently require access to a wide variety of information, but a lack of investment means many associates are often unprepared and lack the right resources to help customers. To change the outcome, customer service representatives need the right training and tools to not only understand the issue,
Tags : 
    
ttec
Published By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: Datastax     Published Date: Sep 27, 2019
In this white paper, you’ll learn about the three most important issues surrounding data management in the age of IoT. You'll also learn how DataStax Enterprise, built on Apache Cassandra™ and native to hybrid cloud environments, is paving the way for the future of data management. Download the white paper to learn more now.
Tags : 
    
Datastax
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
• Simplify business process modeling: Quickly build processes in a straightforward cloud-based interface designed for both IT and business users • Improve process efficiency and accuracy: A central process repository eliminates version control and consistency issues by providing users real-time access to process workflows • Enhance cross-team collaboration: A shared team workspace engages all business process owners, encouraging cross-team participation and continuous process improvement
Tags : 
    
Group M_IBM Q4'19
Published By: NetSpi     Published Date: Sep 20, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify and misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
    
Intel
Published By: SiteImprove     Published Date: Sep 13, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove
Published By: Anaplan     Published Date: Sep 11, 2019
Prior to implementing the Anaplan platform, RSA Group had a tedious spreadsheet-based, nine-month planning cycle riddled with data quality issues, which was compounded by siloed, functional fragmentation across the company. As a result, the finance team was spending a significant amount of time cleaning data rather than analyzing it to provide insight to key stakeholders throughout the business. Using the Anaplan platform, RSA Group reduced their financial planning process from nine months to five months. The workforce planning team experienced a 50% improvement in productivity. The business can now own their connected plans, resulting in improved decision support to business users, as well as improved customer service and financial results.
Tags : 
    
Anaplan
Published By: Alight Solutions     Published Date: Sep 11, 2019
During this 20-minute webinar we’ll uncover the impacts segregation of duties can have on your company if not correctly maintained. We’ll also demo the creation of the reports and dashboards you can set up in your own Workday tenant to uncover potential issues.
Tags : 
    
Alight Solutions
Published By: Shell U.K. Limited     Published Date: Sep 05, 2019
We harness Shell gas-to-liquids (GTL) technology to create high-purity process oils that open exciting opportunities for your products and operations. Conventional process oils are derived from crude oil, whereas Shell Risella X and Shell Ondina X are made from pure synthesis gas. That frees them from the impurities and large molecular variations found in mineral oils. Using GTL process oils could enhance your processes and final products to give you a competitive advantage. [478] Have you ever experienced product quality issues caused by variations in process oil batches? Do you need a low-viscosity process oil, but have concerns about the effect of volatiles on working conditions? Could you offer enhanced products if you had process oils with distinct characteristics, for example, an extremely narrow hydrocarbon distribution range? Our GTL process oils contain a high proportion of paraffinic hydrocarbons and are very pure, which provides key qualities for many applications. For in
Tags : 
shell, risella, ondina, process oils, gas-to-liquids, gtl, purity, pure
    
Shell U.K. Limited
Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro
Published By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Your organization depends on all kinds of inline tools to keep your network up and running, but those same tools can fail, leaving you vulnerable. Moreover, as network speeds increase, slower tools can bottleneck network traffic, making organizations purchase more and more tools, which then introduce complexity and cost. There is a better way to increase network resiliency while reducing security issues, and that’s inline bypass.
Tags : 
    
Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.