HIT Consultant Insightful coverage of healthcare innovation
 

second

Results 201 - 225 of 348Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 24, 2018
Adobe Audience Manager uses identity management tools and device graphs to tie device IDs to individuals or groups. If a customer starts using a device you don’t recognize, you can use second-party data available through a network or co-op to supplement your own, building a complete view of your customer. This allows you to send consistent messaging across devices, whether your customers log in to your site or not.
Tags : 
    
Adobe
Published By: Concur ENT     Published Date: May 11, 2018
VAT has been a valuable source of revenue for the UK Government since 1973. Yet, despite more than 40 years of getting used to calculating, paying and reclaiming VAT, businesses still struggle to adhere to HMRC guidelines. With support from SAP Concur, it doesn’t have to be this way. First, we offer an expense audit solution to check for fraud and non-compliance. Secondly, we work with tax specialists to help you comply with VAT regulations. Thirdly, we give you visibility and control over all aspects of your travel, expense and invoice spending. Crucially, we see VAT reclaim as an opportunity to reduce business costs and put money back in your budget.
Tags : 
    
Concur ENT
Published By: Wyng     Published Date: Jan 13, 2016
McCormick Canada teamed up with Offerpop to launch their highly successful “McCormick Online Cook Off” contest, which invited users to share their best recipes with the brand for a chance to win some really great prizes. Instead of targeting a user base that is already highly saturated with direct competitors, McCormick Canada decided to target an entirely new, untapped market — second generation Filipino-Canadians with a highly customized campaign. By coupling an extremely easy and fun to enter contest with their in-depth customer analysis, McCormick Canada was able to create a wildly successful experience that greatly increased their unit sales year-over-year.
Tags : 
    
Wyng
Published By: Message Systems     Published Date: Jan 23, 2007
"Because of Message Systems, today we can intimately and accurately monitor our email. The second an issue arises, we make adjustments to correct it." Find out why Bluestreak's CTO is so pleased in this case study.
Tags : 
email marketing, deliverability, bluestreak, message systems, messagesystems, email deliverability, e-newsletters, newsletters
    
Message Systems
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft Dynamics CRM 4.0 demonstrated its ability to scale to support the needs of an enterprise organization with a very large customer service database. In a test based on a customer database of over 1 billion records, Microsoft Dynamics CRM was able to achieve sub-second response times using a modest hardware configuration.
Tags : 
crm, enterprise crm, customer relationship management, enterprise software, microsoft, microsoft dynamics, microsoft crm
    
Microsoft Dynamics
Published By: Plex Systems     Published Date: Jun 06, 2014
When a recall occurs, every second counts. Without being able to quickly access all records of inventory movement, tracking information becomes expensive, laborious and time-consuming. Read the Minimizing the Cost and Impact of a Recall and learn which cloud ERP features, such as data management, full traceability and active compliance you might be missing in your current ERP system.
Tags : 
plex systems, faster usability, operations, erp, cloud, production, manufacturing
    
Plex Systems
Published By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
    
Akamai Technologies
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Red Hat     Published Date: Feb 25, 2019
In questo rapporto di analisi, IDC prende in esame le sfide che i clienti sono chiamati ad affrontaree in termini di bilanciamento degli investimenti nelle infrastrutture esistenti, nel miglioramento dell'efficienza e nella modernizzazione dei data center, adottando tecnologie innovative e le più recenti tecniche di deployment per ottimizzare la produttività degli sviluppatori e l'agilità operativa e contenere i costi della gestione del ciclo di vita. IDC approfondisce le alternative a disposizione dei clienti per centrare questi obiettivi, puntando su infrastrutture in grado di supportare i carichi di lavoro esistenti e quelli di prossima generazione e sul ruolo della standardizzazione e modernizzazione per l'ottimizzazione operativa.
Tags : 
    
Red Hat
Published By: Swift Navigation     Published Date: Feb 01, 2017
Download the Free White Paper: Piksi Multi for Autonomous Vehicles to learn how Swift Navigation’s centimeter-level accurate GNSS solution improves the performance of autonomous vehicles. Piksi Multi is a centimeter-accurate RTK GPS receiver designed for easy integration in the automotive core sensor suite. Its multiple bands and satellite constellations improve robustness of autonomous vehicle functionality with 99th percentile accuracy and convergence times in seconds.
Tags : 
rtk, gps, gnss, autonomous vehicle, centimeter-accuracy, multi-band, multi-constellation, l1/ l2
    
Swift Navigation
Published By: NetApp     Published Date: Sep 22, 2014
The NetApp EF series of all-flash arrays are designed specifically for database-driven environments demanding maximum performance, reliability, and availability. This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EF-Series flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited in-house performance testing executed by NetApp were used to create this report. In this report, you’ll learn how ESG validated NetApp’s EF-550 flash array performance of over 400,000 IOPS with sub-millisecond latency, while maintaining 6 nine’s availability.
Tags : 
flash arrays, performance-driven databases, enterprise storage, database environment, serviceability, real world performance
    
NetApp
Published By: NetApp     Published Date: Oct 12, 2010
Read about the simplicity of architecting a robust infrastructure with Microsoft® Windows® Server 2008 R2 Hyper-VT in a virtual environment with NetApp® storage, to provide the ability to maintain HA for both the computing and storage resources between the primary and secondary sites and complete disaster recovery in the event of the loss of a whole site.
Tags : 
netapp, hyper v, microsoft exchange server, sql server, sharepoint server mixed workload, disaster recovery, data center, virtualization
    
NetApp
Published By: Cisco     Published Date: Sep 15, 2015
Walk past your data center, and you might hear a soft, plaintive call: “Feed me, feed me…” It is not your engineers demanding more pizza. It is your servers and applications. And the call is growing louder. Mobile and virtualized workloads, cloud applications, big data, heterogeneous devices: they are all growing in your business, demanding previously unimagined capacity and performance from your servers and data center fabric. And that demand is not slacking. Your employees, applications, and competitive advantage increasingly depend on it. Those servers and applications need to be fed. And if you have not started planning for 40 gigabits per second (Gbps) to the server rack, you will need to soon.
Tags : 
applications, systems integration, cloud, development
    
Cisco
Published By: Emulex Corporation     Published Date: Nov 07, 2013
How long did it take to get a permanent fix for your last network problem? Too long? Even worse, did you fall short of actually getting one? If so, it’s not surprising. But because of network visibility problems, chances are good that your organization is leaking real money in network and business downtime. You can’t manage and protect what you can’t see. While many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their missioncritical high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. This situation has never been ideal, but it is now becoming costlier than ever as we grow more dependent on networks to transact business. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Riverbed     Published Date: Jul 17, 2013
This guide includes a demonstration on how you can accelerate troubleshooting, gain end-to-end visibility, and solve intermittent performance problems without having to recreate them; a detailed case study that shows how a large-scale federal government and defense consultant solved a months-long problem in just 15 minutes; and an on-demand webinar that introduces you to Cascade Shark and Cascade Pilot.
Tags : 
network, troubleshooting, speed of thought, performance, network
    
Riverbed
Published By: Oracle     Published Date: Feb 28, 2018
So, while the advertising industry is in the midst of profound change, it’s hard to be certain about the form that it will take in future. There’s good reason to be optimistic, rather than pessimistic. Firstly, as we saw earlier, the proliferation of digital platforms means that there are now more canvases for creativity than ever before. And secondly, recent discoveries in psychology and behavioural science have highlighted how human decision making – in any context – is often unconscious or non-rational. As a result, the range of problems where creative communication can offer a solution is wider than ever previously realised.
Tags : 
    
Oracle
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: IBM     Published Date: Apr 07, 2015
This 2H-2014 Value Matrix by Nucleus Research evaluates all major BI vendors and their ability to deliver value based on usability, functionality and projects 6-month trends for each vendor to identify best-of-breed capabilities in various dimensions that have evolved in the marketplace.
Tags : 
ibm, nucleus research, market analysis, business intelligence, anallytics market
    
IBM
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Quanto tempo è necessario al tuo team IT per fornire ai dipendenti un batch di cinque notebook con provisioning completo? E per cento notebook? Per mille? A seconda delle dimensioni del tuo ordine, il tempo necessario per configurare manualmente questi dispositivi, combinato con la logistica di spedizione, potrebbe significare giorni o settimane di ritardi per il tuo utente finale. Dell Provisioning per VMware Workspace ONE® è in grado di risolvere questo problema con un intervento minimo da parte dell'IT.
Tags : 
    
Dell EMC EMEA
Published By: MoreVisibility     Published Date: Dec 19, 2017
Although keyword-targeting and on-page search engine optimization are just some areas that search engines evaluate when ranking pages, it is important to get these elements “right.” This complimentary white paper offers tips and a template to help establish a useful foundation for your on-page optimization efforts. Topics include: How to create content for users first, search engines second Body Copy Optimization Checklist Keyword Targeting Best Practices Meta Data Checklist with Downloadable Template Images & Multimedia Content Checklist
Tags : 
    
MoreVisibility
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services
    
CrownPeak
Published By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : 
vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading
    
VSS Monitoring
Published By: Oracle     Published Date: Apr 28, 2014
Oracle held their second annual Value Chain Summit February 3-5, in San Jose, California. The event once again attracted a few thousand Oracle customers who were interested in better understanding Oracle's various supply chain technologies and where they are heading.
Tags : 
oracle, value chain, agile plm, oracle innovation management
    
Oracle
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.