HIT Consultant Insightful coverage of healthcare innovation
 

seg

Results 76 - 100 of 454Sort Results By: Published Date | Title | Company Name
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics
    
Clustrix
Published By: Clustrix     Published Date: Oct 08, 2013
This whitepaper outlines new database technologies that are helping advertisers remove bottlenecks that slow down applications, improve functions such as ad segmentation and targeting based on up to the minute campaign performance and give agency clients instant access to smart data.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics, smart data, applications
    
Clustrix
Published By: Epicor Software     Published Date: Feb 26, 2015
Online consumers are redefining the fulfillment landscape. Wholesalers need to unlock the value of integrated business data. Only full insight into all areas of the distributor’s business will provide the necessary clarity to make decisions they can stand behind. This confidence can be achieved only if they have the required data and technology at hand at the right time. The total technology investment is not small. But, it may mean the future viability of the wholesale distribution segment. Why now is the critical time to invest.
Tags : 
wholesale distribution, online consumers, integrated business data
    
Epicor Software
Published By: MobileIron     Published Date: Mar 16, 2016
Para ayudarle a tener éxito en su trayectoria móvil, esta guía detalla las mejores prácticas y recomendaciones esenciales de las cuatro etapas del ciclo de vida de las aplicaciones móviles: diseño, desarrollo, implementación y mantenimiento. Es ideal para las organizaciones que están preparadas para ir más allá de las aplicaciones básicas, como el correo y el calendario, en dispositivos móviles. Además, ofrece pautas operativas para implementar y mantener las aplicaciones móviles ya existentes.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Apr 28, 2016
Bienvenidos a la primera edición del Informe sobre Seguridad Móvil y Riesgos del MobileIron Security Labs (MISL). Este informe ofrece información sobre el estado de la situación general de la seguridad y las amenazas móviles, destaca los riesgos emergentes y recomienda modos de reforzar las implementaciones corporativas móviles.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customer’s everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Un numero sempre crescente di aziende ricorre alla containerizzazione delle applicazioni per aumentare l'efficienza e la velocità dello sviluppo. Grazie ai container, gli sviluppatori possono inserire in un pacchetto, inviare ed eseguire qualunque applicazione sotto forma di container leggero e autosufficiente, eseguibile praticamente ovunque, per garantire la portabilità istantanea dell'applicazione. Per comprendere più chiaramente lo stato del monitoraggio dei container, abbiamo intervistato 100 executive e identificato i principali trend per i container. In questo eBook viene esaminato ogni singolo trend, quindi vengono forniti indicazioni concrete e passi successivi da compiere per garantire il controllo completo del monitoraggio dell'ambiente container.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione La forza lavoro di oggi è abituata a utilizzare tecnologie personali che semplificano le comunicazioni e la vita quotidiana. Molti strumenti aziendali, tuttavia, non sono riusciti a rimanere al passo. La maggior parte delle attuali soluzioni di project and portfolio management non è in grado di fornire modi semplici per svolgere le attività quotidiane. Non facilitano le comunicazioni contestuali che agevolerebbero la risoluzione dei problemi e non dispongono di funzionalità chiave: capacità di restringere il focus ai dati pertinenti, di eseguire il drill-down per accedere a ulteriori informazioni e di prevedere in modo efficiente le necessità finanziarie e modellare i risultati.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
De un solo vistazo Los trabajadores de hoy en día están acostumbrados a usar tecnologías personales que facilitan la comunicación y que simplifican sus vidas. Sin embargo, muchas herramientas empresariales no han podido seguir el ritmo. La mayoría de soluciones de gestión de carteras y productos actuales no logran proporcionar formas sencillas de realizar las tareas diarias. No facilitan una comunicación en contexto que ayude a solucionar los problemas y no cuentan con funcionalidades básicas, como la capacidad de estrechar el foco sobre los datos relevantes, de clasificar información adicional, de realizar previsiones financieras eficaces y de modelar los resultados.
Tags : 
    
CA Technologies EMEA
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: IBM     Published Date: Jul 07, 2015
IBM named a leader in Gartner's first ever Magic Quadrant on Disaster Recovery as a Service.
Tags : 
disaster recovery, backup, infrastructure, segmentation, restoration
    
IBM
Published By: WNS     Published Date: Jun 21, 2017
'Innovatively growing a consumer base, especially non-users' can be a challenging task for a CPG organization, looking for growth strategies in a world of discerning loyalty and fragmented markets. WNS designed a personalized consumer analysis framework that enabled a CPG major to successfully target non-user target segments, and enabled a two-fold growth in consumer base and revenue from sales.
Tags : 
consumer survey, data set, u&a studies, analysis, non-users, price optimization, brand affinity, cpg
    
WNS
Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS
Published By: Peoplefluent     Published Date: Apr 02, 2013
Today’s “connected” generation is comprised of tech-savvy workers whose strengths must be harnessed for competitive advantage. Read how to reach “Gen C” and develop talent management strategies to attract, engage and retain this workforce segment.
Tags : 
collaboration, generation c, talent management, mobile, social, social hcm software, talent management software, talent management strategies, next generation workers, hcm technology, hr strategies, human resource management software, social recruiting software, mobile talent management, connected generation of workers, hr software, social collaboration, workforce management, mobile technology, social technologies
    
Peoplefluent
Published By: Monetate     Published Date: Sep 30, 2014
Personalization. It’s about the hottest topic out there for digital marketers. If you’re going to do it, though, you need to know with which customers you should start your personalization efforts. Which means you need to know which of your customers are most valuable—not always an easy task. This white paper will teach you how to identify your most valuable customers, create a personalized experience for them, optimize that experience, and begin the process again with another customer segment. Also included are three real-life examples of companies that found their most valuable customers, focused on personalizing their relationships with them, and drove additional business, increased customer loyalty and improved customer retention.
Tags : 
personalization, customer retention, customer loyalty, digital marketers
    
Monetate
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks
Published By: Cisco     Published Date: Apr 11, 2016
Los atacantes y los responsables de la seguridad están desarrollando tecnologías y tácticas cada vez más sofisticadas. Por su parte, los atacantes están creando infraestructuras back-end sólidas para el lanzamiento y soporte de sus campañas. Los ciberdelincuentes están perfeccionando sus técnicas para obtener dinero de sus víctimas y para evitar ser detectados mientras continúan robando datos y propiedad intelectual.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
Máxima eficacia en seguridad en el Security Value Map de sistemas de detección de violaciones de NSS
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
A través de los años, todos hemos escuchado hablar de soluciones simples y aparentemente mágicas que permiten resolver problemas de seguridad, incluido el uso exclusivo de la tecnología de sandboxing para combatir el malware avanzado y las amenazas dirigidas.
Tags : 
    
Cisco
Published By: Staples Business Advantage     Published Date: Oct 24, 2018
Personal devices on corporate networks. Social media in the office. Millennials in the workforce. Technology is changing fast in the workplace and corporate IT managers are working to support a wider variety of user segments without putting the organization at risk. Watch this on-demand webinar to hear two IT experts diagnose the impact of the latest technology trends in the workplace and provide useful advice on how to support new user segments securely.
Tags : 
it security, mobility, it user segments, technology trends, enterprise technology
    
Staples Business Advantage
Published By: Staples Business Advantage     Published Date: Jun 01, 2017
Watch this on-demand webinar to hear senior research director Patrick Connaughton from the Hackett Group review the latest research on supplier segmentation and stratification strategies. You’ll also get practical advice on implementing these best practices at your organization.
Tags : 
procurement, procurement strategy, purchasing, vendor selection, supply chain, supplier management, strategic sourcing, vendor management, srm, supplier relationship management
    
Staples Business Advantage
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: Cisco     Published Date: Dec 27, 2017
Flexible work arrangements (FWAs) can come in many forms, including telecommuting, compressed workweeks and flexible scheduling that allows employees to perform tasks outside of core business hours. Improvements in technology have made FWAs possible for a broader segment of the labor force, but some of these arrangements have yet to achieve widespread acceptance in many organizations’ workplace cultures. However, SHRM research shows that participation in some FWAs has risen in recent years, and these measures have yielded positive results for companies’ recruitment and retention efforts, as well as their employees’ development and productivity.
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.