HIT Consultant Insightful coverage of healthcare innovation
 

mining

Results 26 - 50 of 238Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship, customer engagement
    
Adobe
Published By: Socialbakers     Published Date: Jul 22, 2015
In this report, we delve into the way Dairy brands reach Fans and prospects on social media, examining what kinds of posts they make and seeing what Fans respond to most, to help your brand optimize your content for maximum engagement.
Tags : 
social media, social media engagement, engagement, brands, content strategies, deliver content
    
Socialbakers
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper will explore the impacts of fatigue that extend beyond personal safety and outline effective remedies for this widespread concern.
Tags : 
workforce software, fatigue, personal safety
    
Workforce Software
Published By: Workforce Software     Published Date: Dec 02, 2015
Fatigue management delivers business benefits in terms of your overall workforce management strategy, whether it is an expected function of the business or not. Mitigating fatigue risk can have a dramatic impact on your workforce and your bottom line. Proactively managing employee fatigue is a hallmark of leading businesses, as it demonstrates concern for your employees, customers and the larger community.
Tags : 
employee fatigue, productivity, workforce management, productivity, fatigue management
    
Workforce Software
Published By: WFS Australia     Published Date: Dec 02, 2015
Fatigue management delivers business benefits in terms of your overall workforce management strategy, whether it is an expected function of the business or not. Mitigating fatigue risk can have a dramatic impact on your workforce and your bottom line. Proactively managing employee fatigue is a hallmark of leading businesses, as it demonstrates concern for your employees, customers and the larger community.
Tags : 
employee fatigue, productivity, workforce management, productivity, fatigue management
    
WFS Australia
Published By: Evariant     Published Date: Nov 14, 2016
Changing healthcare market forces, such as value-based care models, consolidation, and payer mix erosion, have propagated declining margins and fueled hyper-competition among healthcare organizations vying for market share. In this new world, determining effective patient engagement strategies has become paramount for hospitals and health systems as they strive to acquire, retain, and re-activate patients, and, ultimately, drive revenue. Now, more than ever, it is critical that healthcare organizations create and maintain positive, lasting relationships with their patients, both current and prospective, working to attract them into their network and keep them there.
Tags : 
healthcare crm, ehr, healthcare technology, marketing, patient acquisition, patient engagement
    
Evariant
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: IBM     Published Date: Oct 13, 2011
This whitepaper from IBM reveals three ways that the most successful companies are taking action when they deploy business analytics.
Tags : 
ibm, big data, analytics, knowledge discovery, data mining, business analytics and optimization, bao, business analytics, insight
    
IBM
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: LogMeIn     Published Date: May 31, 2016
LivePerson’s forced migration to the LiveEngage platform has businesses like yours re-examining their live chat options. Given the painful relationship they’ve endured for years with LivePerson, many customers are wary, and they want to make sure that they make the right move. BoldChat is working with a number of former LivePerson customers who came to us looking for a true partner – one that not only wants to earn their business, but to continue earning it every day. What they’re getting in return is much more.
Tags : 
boldchat, logmein, liveperson, chat, customer service, customer experience
    
LogMeIn
Published By: Akamai     Published Date: Jun 14, 2010
Looking back to the first iterations of travel Web sites, we can appreciate just how far technology has come. As advancements like high-speed connections began to replace the now archaic dial-up experience, consumers adjusted their expectations and demands of the companies they patronized. To gain a deeper understanding of the status of travelers' current online expectations, Akamai commissioned PhoCusWright to conduct a study examining key elements of the online consumer experience.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load, abandonment
    
Akamai
Published By: Success Factors     Published Date: Aug 10, 2012
Will the people you need for your future workforce be there? This complimentary SuccessFactors white paper shows how to shorten the journey to data-driven decision-making about talent. Download it today.
Tags : 
successfactors, sap, best practices, workforce planning, data-driven decisions, workforce analytics, data mining, predictive modeling, skills gaps, workforce manager, big data, fact-based decisions
    
Success Factors
Published By: SumTotal Systems     Published Date: Oct 10, 2013
E-learning is already known to be the most efficient and cost effective way to deliver training to a workforce. However, the best way to truly prepare employees for meeting organisational objectives is to focus the training on three major areas of skill development. Using a learning solution that is capable of delivering optimal training on each type of skill and checking for comprehension by examining the outcomes from other HR processes will drive performance within the company as employees develop their soft, functional and compliancebased skills.
Tags : 
e-learning, sumtotal, training, development, employee training, employee development, workforce, workforce management, skill development, human resources, hr technology, soft skill development, function skill development, compliance development, enterprise learning
    
SumTotal Systems
Published By: Castlight Health     Published Date: Apr 21, 2016
According to American Society of Addiction Medicine (ASAM), opioid abuse costs employers approximately $10 billion from absenteeism and presenteeism alone. Despite the breadth and seriousness of this crisis, America’s employers lack a true understanding of how it impacts individuals in the workforce and their families. Castlight developed this first-of-its-kind study on opioid abuse by examining de-identified and anonymous health data reporting from Americans insured by large employers who use our product.
Tags : 
castlight health, workforce, asam, addiction medicine, opioid
    
Castlight Health
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The world of computing is changing before our eyes. Industries that had a consistent and predictable business model for generations are being turned upside down. In the digital economy, a seamless customer experience is critical. Whether a retailer is exploring new innovative online selling strategies or a bank is determining how to anticipate customer needs for new services – a high performing and scalable IT ecosystem is key to success. At the end of the day, as an IT leader, you need to help your business anticipate opportunities, drive growth and proactively prevent threats to your company’s revenue.
Tags : 
proactively manage, remediate faster, improve productivity, collaborate efficiently, application performance, ca technologies
    
CA Technologies
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether we’re talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The manufacturing landscape faces dramatic change. Creating and capturing value in this new environment requires aerospace companies to not just understand what’s driving these changes, but also grasp just how consequential a role digital transformation will play in determining their future. Download this white paper now to find out how the manufacturing landscape faces dramatic change.
Tags : 
aerospace, aviation, manufacturing, product development, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: IFS     Published Date: Aug 10, 2011
Examining the construction industry's move from point solutions towards project-based ERP.
Tags : 
ifs, construction industry, erp software, enterprise resource planning, manufacturing sector, enterprise application
    
IFS
Published By: Workday     Published Date: Mar 13, 2018
This report is a must-have for all service-oriented organizations considering a PSA solution. Examining the survey responses of 68 billable organizations, this detailed report gives you a holistic understanding of the benefits PSA can offer companies like yours. Read the report to see how PSA provides the real-time visibility to improve your productivity and profit.
Tags : 
service oriented, psa, productivity, profit
    
Workday
Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence, analyse applicative, datamining, réseau, optimisation du réseau, business analytics, application, sécurité des applications
    
Extreme Networks
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: Dell     Published Date: Sep 26, 2017
Government leaders have the unprecedented opportunity to accelerate the path to IT modernization. Download this whitepaper to learn more about the IT trends driving digital transformations and the considerations to be made in determining a successful strategy toward effective and compliant IT modernization. With the right approach, organizations can create an efficient and future-ready launching pad to agilely, cost-effectively and securely meet the needs of constituents, employees and internal customers; accommodate increasing data volumes; and comply with regulatory requirements.
Tags : 
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.