HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 1 - 25 of 470Sort Results By: Published Date | Title | Company Name
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons aren’t possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Businesses of all sizes struggle with aging gear and lack of storage. In fact, in a 2018 Enterprise Storage Forum survey, IT and business leaders cited these concerns as their two biggest storage infrastructure challenges. But in mid- to enterprise-sized businesses, where every dollar counts, fixing these problems can feel like a tall order. If you’re going to upgrade your storage, you need to make sure you’re getting an efficient array that will help you maximize the value of your storage and your data. We tested two storage arrays to see which could best help organizations meet these goals: the Dell EMC™ Unity™ XT 880F, and an all-flash offering in the entry-level market from a competitor (“Vendor A”). In our hands-on testing, the Dell EMC Unity XT array processed up to 93 percent more input/output operations per second (IOPS) in an 8KB 100% random read test and reduced 129 percent more data. It also carried out common management tasks faster, cutting the number of deployment steps i
Tags : 
    
Dell EMC Storage
Published By: Adobe     Published Date: Feb 09, 2016
Marketing is changing. The traditional model, which saw the customer path as a linear funnel, is broken. Today, customers follow whatever path they want, and you’re expected to reach out to them on their terms.
Tags : 
marketing, marketing strategies, marketing trends, customer experience, data, customer relationships
    
Adobe
Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers, state of the hospitality industry, smart data dives, automating convenience, the personalization equation, location technologies, key qr code applications, customer service, customer satisfaction
    
Zebra Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Workday DACH     Published Date: Jul 05, 2019
"Die Studie „2019 Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises“ erleichtert Ihnen die ERP-Anbieterbewertung um ein Vielfaches. Workday wurde von Gartner in puncto Umsetzungsfähigkeit („ability to execute“) und Vollständigkeit der Vision („completeness of vision“) das dritte Jahr in Folge als „Leader“ ausgezeichnet. In dieser Studie erfahren Sie, warum Ihnen die Wahl des richtigen Cloud-Partners für Ihre Kern-Finanzprozesse dabei hilft, die größten Herausforderungen der heutigen Zeit anzupacken."
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday DACH     Published Date: Jul 05, 2019
Die Studie „2019 Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises“ erleichtert Ihnen die ERP-Anbieterbewertung um ein Vielfaches. Workday wurde von Gartner in puncto Umsetzungsfähigkeit („ability to execute“) und Vollständigkeit der Vision („completeness of vision“) das dritte Jahr in Folge als „Leader“ ausgezeichnet. In dieser Studie erfahren Sie, warum Ihnen die Wahl des richtigen Cloud-Partners für Ihre Kern-Finanzprozesse dabei hilft, die größten Herausforderungen der heutigen Zeit anzupacken.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Anaplan     Published Date: Sep 07, 2018
Sie können sich sicherlich noch an den Planungsprozess der letzten Jahre erinnern. An die vielen Spreadsheets, die vielen Überstunden und die Tatsache, dass die Pläne der verschiedenen Unternehmensbereiche und Abteilungen nicht wirklich miteinander vernetzt waren. Lesen Sie nach, warum Sie sich nicht mehr auf altmodische, unübersichtliche und überkomplizierte Spreadsheets verlassen sollten, wenn es um Ihre Planung geht. Anaplan wurde in der Studie “The Planning Survey 2017” von BARC in 21 von insgesamt 31 Bewertungskategorien auf den 1. Platz gewählt. In den übrigen 10 Kategorien hat Anaplan den 2. Platz erreicht – zum Teil weit vor den anderen Mitbewerbern. Speziell in den Kategorien “business benefits”, “planning functionality”, integrated planning” und “flexibility” konnte Anaplan durch erste Plätze überzeugen. Laden Sie sich Ihr persönliches Exemplar der Studie herunter und lesen Sie selbst nach, warum Anaplan so herausragende Ergebnisse bei den Anwendern erzielen konnte.
Tags : 
    
Anaplan
Published By: Uberall     Published Date: Aug 26, 2019
Besuchen Kunden Ihre Website, sollen sie möglichst das bekommen, was sie suchen: Die Produkte oder die Services, für die Ihre Marke steht. Aber wie kommen sie dahin, wenn sie diese nicht online kaufen können – oder wollen?
Tags : 
kunden, filialen, produkten, produkte
    
Uberall
Published By: AppNeta     Published Date: Oct 28, 2013
This article explores a new approach to assuring web-based application performance and the three key capabilities you need to ensure exceptional application delivery and end-user experience.
Tags : 
appneta, web application performance, web applications, application performance, deployment, latency, end user experience, response time, web performance optimization, delivery chain, network performance, apm, full stack, rum, stm, real user monitoring, synthetic transaction monitoring
    
AppNeta
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
IDC empfiehlt Unternehmen, die ihre IT-Umgebungen modernisieren und operative Risiken, die Kosten verursachen können, begrenzen möchten, Data-Protection-Initiativen höchste Priorität einzuräumen. Um Ihre IT wirklich zu transformieren, modernisieren Sie Ihr Rechenzentrum, um die IT-Effizienz zu steigern. Befreien Sie sich aus Ihren technischen Abhängigkeiten und schützen Sie gleichzeitig Ihre Erträge. Treiben Sie die IT-Transformation voran und erzielen Sie Ergebnisse mit führenden Unternehmenslösungen von Dell EMC, powered by Intel®.
Tags : 
    
Dell EMC & Intel
Published By: Veritas     Published Date: Oct 03, 2016
Dieses Whitepaper fasst zusammen, warum Backup- und Wiederherstellungslösungen dringend modernisiert werden müssen und beschreibt wichtige Anforderungen an mögliche Lösungen sowie den einzigartigen Funktionsumfang der Veritas NetBackup™-Appliances für eine einfache, vollständige und kostengünstige Lösung.
Tags : 
    
Veritas
Published By: Gigya     Published Date: Jun 20, 2014
As marketers the world over share conflicting stories of social triumph and trial in the pages of leading industry pubs, rumors run rampant across this largely uncharted marketing territory. We’re busting 5 major social marketing myths that have made their way into mainstream marketing lore, and revealing proven facts and strategies to help guide your social efforts and execution.
Tags : 
social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data, increase social engagement, consumer data management, permission based identity, single sign on, social consumer insights, big data marketing, data driven marketing , social marketing, social widget, social network plugin vendors, janrain, social annex
    
Gigya
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: HP & Intel     Published Date: Oct 04, 2011
Read this Cloud Security Planning Guide to make sure your cloud computing initiatives avoid these dangerous - and costly - pitfalls.
Tags : 
    
HP & Intel
Published By: Druva     Published Date: Sep 27, 2017
Virtualization tools are providing storage pros with the ability to overcome the limitations of physical servers and gain more flexibility. While hypervisors are allowing them to leap over these boundaries, they’re simultaneously crumbling traditional data protection walls. It’s time to rethink how we handle backup. Inside, discover 8 essential real-world practices to put in place for hypervisor backup, archiving, and disaster recovery.
Tags : 
vmware, virtualization, hypervisors, data protection, archiving, disaster recovery
    
Druva
Published By: Red Hat     Published Date: Dec 22, 2010
Join us live starting at 7 a.m. EST on Jan. 26, 2011. The event will be on-demand worldwide the months following. The Red Hat Virtual Experience is a complimentary global online forum of Red Hat experts, partners, customers, and the open source community.
Tags : 
red hat virtual experience, cloud computing, virtualization, collaboration
    
Red Hat
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: IBM     Published Date: Oct 09, 2009
Succeeding in today's economy not only means utilizing technology to create intelligent, instrumented and interconnected solutions, but leveraging technology to optimize costs and do more with less. This brochure describes how the 3 key attributes of IBM's application foundation help deliver higher quality of service at a lower cost than JBoss.
Tags : 
websphere application server, ibm, jboss, application foundation, open source, tco, configuration, oss
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM offers self-service BI capabilities that tell you what you need to know about the past, present and future—fast. Here are five reasons why you should choose IBM for self-service business intelligence.
Tags : 
self-service business, bi capabilities, business intelligence, predictive analytics, dashboards
    
IBM
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
By refreshing servers in a timely fashion, IT can avoid operating costs that increase significantly in years 4-6 of a server’s life span while benefiting from improved performance and agility. In fact, operating costs in years 4-6 of a server’s life span increase to 10x the cost of the initial server acquisition cost. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.