HIT Consultant Insightful coverage of healthcare innovation
 

second

Results 176 - 200 of 365Sort Results By: Published Date | Title | Company Name
Published By: BlackLine     Published Date: Jun 12, 2017
The last ten years have seen two seismic shifts for accounting and finance teams. First, the expectations of finance have changed: be more efficient and agile in an increasingly regulatory environment while also being more strategic. Secondly, a new wave of modern finance apps have arrived for core accounting, financial close, and planning and reporting, that are designed to automate more and analyze more.
Tags : 
    
BlackLine
Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware
Published By: ProfitBricks     Published Date: Jun 28, 2013
What it means, and why we need it now
Tags : 
iaas, cloud computing
    
ProfitBricks
Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
Adobe Audience Manager uses identity management tools and device graphs to tie device IDs to individuals or groups. If a customer starts using a device you don’t recognize, you can use second-party data available through a network or co-op to supplement your own, building a complete view of your customer. This allows you to send consistent messaging across devices, whether your customers log in to your site or not.
Tags : 
    
Adobe
Published By: Xangati     Published Date: Feb 04, 2016
What can you do to optimize your converged infrastructure efficiency? While there are no 10-second, quick-fix answers, here are five strategies you can start implementing right now to bring your organization much closer to optimal efficiency and longterm cost savings.
Tags : 
xangati, infrastructure efficiency, best practices, serve efficiency, it solutions
    
Xangati
Published By: Monotype     Published Date: Mar 28, 2017
Your brand may have throngs of fans and followers — people who “Like” or “Follow” a particular page or account. While these metrics are certainly important, they don't always equate to obvious value for your brand. The followers who are so passionate that they're creating branded content and advocating for you are the ones to focus on. Advocates are one of the best, most cost effective ways to drive business, hands down. Advocates are users with a true connection, passion and commitment to a particular brand or product. Advocates drive action, not just awareness, and unlike paid advertisers, they advocate because they want to. The second a customer becomes so invested in your brand that they share the love with their networks, they become your best marketer.
Tags : 
swyft, branding, brand advocates, consumer, purchase intent, content, media
    
Monotype
Published By: Oath     Published Date: Nov 06, 2017
42% of consumers make the internet their first stop for healthcare information, ranking the web second to actual physicians. Following this trend, healthcare marketers have increased their investment in a variety of digital advertising channels such as native, video, mobile, content and more in order to better educate and inspire healthcare consumers. But whatever digital channels healthcare marketers choose, the environment matters. Consumers make snap judgments about brands based on adjacency. Over two-thirds of your audience will feel less favorably towards a brand if its placed next to untrustworthy, offensive, or low-quality content. Fortunately for brands the flip side is also true, which is why it’s imperative that you guarantee ad placements that share digital space with premium content. With Oath’s reputation as a trusted publisher, healthcare brands can experience peace of mind knowing their consumers will make positive associations that will increase brand loyalty.
Tags : 
healthcare, physicians, digital, advertising
    
Oath
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: Incapsula     Published Date: Nov 06, 2017
Does your website load in two seconds or less? If not, you could be disappointing nearly half of your customers. According to Kissmetrics, 47 percent of e-commerce users expect websites to load in less than two seconds – and nearly a quarter of them will abandon your website entirely if it takes longer than four seconds. Additionally, 50 percent of customers shop on their mobile phones. In other words, your website needs to load fast and be optimized or your customers will leave. The reality is that an e-commerce company can increase revenue by up to 7 percent just by making the load time one second faster. So, how can your company improve its site performance and make it faster? The best practices outlined in this whitepaper can reduce your site’s loading time, improve your user experience, and ultimately increase your company’s revenue.
Tags : 
    
Incapsula
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: DataCore     Published Date: Apr 23, 2019
The emphasis on fast flash technology concentrates much attention on hot, frequently accessed data. However, budget pressures preclude consuming such premium-priced capacity when the access frequency diminishes. Yet many organizations do just that, unable to migrate effectively to lower cost secondary storage on a regular basis. In this white paper, explore: • How the relative proportion of hot, warm, and cooler data changes over time • New machine learning (ML) techniques that sense the cooling temperature of data throughout its half-life • The role of artificial intelligence (AI) in migrating data to the most cost-effective tier.
Tags : 
storage tiering, auto tiering, all-flash array, ssd, software defined storage, hyperconverged, data migration, storage migration
    
DataCore
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial ‘top of mind’ topic for Higher Education. For the second time in three years, information security topped Educause’s annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
    
ALE
Published By: Tealeaf     Published Date: Mar 31, 2011
Given the increasing importance of connected channels to nearly all businesses and government functions, it is no wonder that analysis of these channels is getting more attention.
Tags : 
tealeaf, advanced site optimization, web analytics, digital analysis application, analytics intelligence
    
Tealeaf
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This paper is the second in a series. The first, Acceleration 101, describes acceleration features and terms. This paper focuses on topology options for deploying acceleration features in an Application Delivery Network (ADN).
Tags : 
acceleration, application delivery network, application acceleration solution, acceleration deployment
    
F5 Networks Inc
Published By: NetApp Exchange Upgrade     Published Date: Dec 17, 2008
Regardless of industry or geographic location, business information is exploding on a massive scale—affecting primary, secondary, and archival storage systems. The sheer quantity of data being amassed is outpacing organizations' ability to keep tabs on it, maintain corporate compliance, meet strict government regulation, and even simply house it in a useful format that can provide invaluable history and knowledge. Learn more today.
Tags : 
netapp, microsoft exchange server 2007, netapp networked storage, storage systems, storage infrastructure, microsoft exchange deployments, server virtualization, scalability limitations
    
NetApp Exchange Upgrade
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage
    
NetApp
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Riverbed     Published Date: Oct 16, 2012
Einstein Noah Restaurant Group wanted to find ways for its locations to effectively use its new SharePoint portal and WAN for general communications. Learn how Riverbed WAN optimization decreased their download time from 20 minutes to 16 seconds.
Tags : 
wan optimization, riverbed, sharepoint, data management, communications, data transfer
    
Riverbed
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee
Published By: Movable Ink     Published Date: Apr 01, 2016
You don’t get a second chance at a first impression. Your email welcome series is one one of the best opportunities you have to build a lasting relationship with a customer. But the stakes are high — you can gain or lose a customer in that initial contact. But with proper planning and data, a well-crafted welcome series can help build a love story between you and your subscribers. This eBook will guide you through the steps to build a welcome series that will turn your subscribers into loyal customers, while collecting valuable data along the way that will drive action throughout the customer relationship.
Tags : 
email marketing, email welcome series, email personalisation, email design
    
Movable Ink
Published By: Zebra Technologies     Published Date: Jun 07, 2017
Zebra Technologies analyzed the state of the hospitality industry and conducted two research studies. The first study focused on the hotel/resort industry and measured senior executives, IT leaders, guest services and marketing respondents’ views on guest needs, their strategic technology and service plans, and vision for the future. The second consumer study measured travelers’ preferences, technology requirements and opinions on the factors influencing their overall satisfaction at hotels and resorts. The results of these studies are shared in this 2016 Hospitality Vision Study.
Tags : 
zebra technologies, hospitality, technology convenience, location technologies
    
Zebra Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.