HIT Consultant Insightful coverage of healthcare innovation
 

it executives

Results 276 - 300 of 451Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q3'19
Published By: ParAccel     Published Date: Nov 15, 2010
This solution brief explains how Fidelity Information Services (FIS) executives realized that they needed an analytics database solution that could keep up with additional fraud complexity as well as much larger sets of data to improve detection rates.
Tags : 
paraccel, analytic database, financial fraud analytics, fidelity information services
    
ParAccel
Published By: ParAccel     Published Date: Dec 16, 2010
This solution brief explains how Fidelity Information Services (FIS) executives realized that they needed an analytics database solution that could keep up with additional fraud complexity as well as much larger sets of data to improve detection rates.
Tags : 
paraccel, analytic database, financial fraud analytics, fidelity information services
    
ParAccel
Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony
Published By: Workfront     Published Date: Nov 17, 2015
How will ensure your marketing initiatives’ success in 2016? Join us for a TED-style webinar on Wednesday, December 16, at 1:00 p.m. ET, with marketing thought leaders Ann Handley, Jay Baer, Joe Staples, and Mark Schaefer as they provide forward-looking recommendations on how marketing managers and executives can confront and overcome the challenges of the coming year. How your marketing team works is as important as what they’re working on. The winners in 2016 will be those teams who optimize their team’s work processes and tools for maximum creativity, efficiency, and reactivity. This webinar promises tips and tricks on how to build this kind of high-performing marketing team, including: • How to better plan, prioritize, and manage your work for a successful 2016 • Trends that impact the way marketers work and their ability to succeed • How to manage your teams to understand the full scope of work and make data-driven decisions
Tags : 
    
Workfront
Published By: RingCentral     Published Date: May 22, 2014
Telecommunications (Telecom) and mobility executives responsible for sourcing the next generation of products and services for their business face big challenges in 2014. Learn what insights and action plans top executives are taking to prepare their organization for change by downloading the Forrester Research Whitepaper.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: Equinix     Published Date: Mar 26, 2015
The businesses that thrive amid fluctuating technology demands are not only keeping a finger on the pulse of current trends, they have the infrastructure in place to handle whatever changes might come. And they’re doing so by treating their data centers as a strategic asset—a hub from which providers and performance can all stem. Are you ready for what’s next? According to analyst forecasts and IT executives, the five key trends affecting our state of technology are mobility, consumer technology, cloud services, hyperdigitization and globalization. In the following pages, you’ll learn how these trends are affecting current networks, and why a strategic data center is key to not only surviving, but thriving, today and in the future.
Tags : 
technology demands, infrastructure, mobility, consumer technology, cloud services, hyperdigitization, globalization
    
Equinix
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
: Interested in knowing what CIOs and other IT executives really think about the future of enterprise mobility? Enterprise Mobile uncovers the results of a survey conducted to assess the business impact of enterprise mobility based on input from technology leaders. The webinar provides tips to prepare for the future of enterprise mobility, secrets to removing barriers to mobile strategy implementation, and shares trends around how other companies are embracing mobile security.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldn’t it be your company’s? Learn more in this report.
Tags : 
    
PwC
Published By: Kontiki     Published Date: Sep 16, 2014
Learn how to reach and engage remote employees within your organization and see how this will strengthen employee engagement, create personal connection with executives, and increase collaboration between teams and employees.
Tags : 
employee engagement, adoptions trends, solutions, best practices, video webcasting, internal communication, company-wide participation
    
Kontiki
Published By: Trillium Software     Published Date: Jun 29, 2011
This paper has tried to help those who are trying to gain commitment via a simple six step set of actions. Following these will greatly increase your chances of opening the right doors and keeping them open.
Tags : 
trillium software, data quality, warren bennis, senior executives, dq improvement program, collaboration, business transformation challenge
    
Trillium Software
Published By: SAP     Published Date: Nov 22, 2011
Today's competitive and fast-paced business environment requires that more people have access to real-time performance and status information, so they can make quick and intelligent decisions. The need for timely and succinct business intelligence continues to grow as executives demand critical information to seize opportunities faster than competitors and to address potential problems in the making. C-level executives and upper management aren't the only staff needing access to business intelligence. Business unit managers and rank-and-file personnel increasingly must also have updated information to do their jobs. This white paper discusses the features and benefits of next generation dashboards.
Tags : 
ziff davis enterprise, dashboards, business intelligence, technology, business trends, bi solutions
    
SAP
Published By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : 
insights, technology, cios
    
IBM APAC
Published By: IBM     Published Date: Apr 26, 2016
Redefining Markets: Insights from the Global C-suite Study – The CMO perspective This report draws on input from the 5,247 C-suite executives (CxOs) who participated in our latest C-suite Study. We now have data from more than 28,000 interviews stretching back to 2003. Here, we focus on the perspectives of Chief Marketing Officers (CMOs).
Tags : 
ibm, ibm institute for business values, c-suite study, cmo, media, entertainment
    
IBM
Published By: SAP     Published Date: Nov 17, 2016
Technological advances are disrupting the status quo and bringing huge turmoil in their wake. Industries are converging, and new competitors emerging, as never before. The nature of work is changing and demand for digital expertise is soaring, while other skills are becoming defunct. So how can CHROs chart a path through the turbulence and help their fellow executives understand the impact on the workforce?
Tags : 
sap, human resources, employee, talent, chro
    
SAP
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Group M_IBM Q3'19     Published Date: Jul 19, 2019
Hear the highlights from industry leaders presented their experience in digital transformation at Reinventing Financial Services 2019. Hearing from executives leading IT, operations, and lines of business from companies such as USAA, Bank of America, HSBC, Prudential, and many others in this session, we’ll cover the strategies and tactics for building the platforms necessary for reinventing customer experience, empowering employees and creating te
Tags : 
    
Group M_IBM Q3'19
Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: • how consumer expectations are shifting on the topic of digital trust • how well the priorities of consumers and security executives align • what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Many executives struggle to understand what intelligent automation means for their organisation and its operations. This global survey of almost 600 business leaders reveals the why, what and how of successful adoption. Read the report to find out: • which functions are leading on automation-related investment • what executives experience as the biggest challenges to implementation • how businesses expect IA to impact their existing workforce • ten practical action points for driving scale in IA.
Tags : 
    
KPMG
Published By: CyberSource     Published Date: Sep 26, 2017
Payment management is critical to successfully operating in multiple countries. Read this report to learn what executives consider their top global operating challenges, and how payment management helps to resolve them.
Tags : 
    
CyberSource
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.