HIT Consultant Insightful coverage of healthcare innovation
 

source

Results 1 - 25 of 3421Sort Results By: Published Date | Title | Company Name
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Forbes recently referred to robotic process automation (RPA) as “a gateway drug to AI,” referencing its low barrier to entry compared to other technology choices within the AI realm. But while experts continue to tout the future of RPA, what can we expect of it in the short-term? Jump into this resource to get a peek at how experts are predicting RPA’s 2019 will pan out, including notable market shifts, major technology disruptions, and entirely new RPA use cases.
Tags : 
    
Automation Anywhere APAC
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Aventri     Published Date: Apr 11, 2019
"Successful meetings management requires a wide array of skills and tools to help you meet stakeholder's expectations and reach your goals. From tools to assist with budget creation to meeting approval workflows and cost-effective venue sourcing, a great meetings management program takes a lot of effort. That's why at Aventri, we created an eBook that combines all the essential meeting management strategies into one package. Learn how to: • Efficiently source the right meeting venue • Use the right meeting management technology to increase success • Implement money saving strategies with big budget results • Measure your total meeting spend and return. In the end, you will feel confident in your abilities to implement a successful meeting management strategy at your organization."
Tags : 
    
Aventri
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat è il partner scelto da migliaia di aziende, fornitori di soluzioni software, cloud e hardware, e dalla community open source globale. Una sottoscrizione Red Hat® Enterprise Linux® garantisce accesso diretto a innovazione e supporto all'interno della community open source e di una rete di provider e clienti. La tecnologia open source di Red Hat promuove le innovazioni di oggi e alimenta i progetti tecnologici che vedremo nascere in futuro. Scopri tutti i vantaggi della sottoscrizione.
Tags : 
    
Red Hat
Published By: Unit4     Published Date: Apr 12, 2019
Looking for a smarter way of financial planning and budgeting? An integrated financial planning tool makes the annual budgeting process more effective and efficient, and with one centralized source of truth it is always up-to-date. Learn how Unit4 Prevero can transform your budgeting and forecasting process: from integrating operational budgets, automating key processes, supporting multiple scenario simulations, through to using artificial intelligence and deep machine learning to improve accuracy of data and power your decision making.
Tags : 
    
Unit4
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: Here Technologies     Published Date: Mar 29, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Anaplan     Published Date: Apr 02, 2019
Connected organizations collaborate across business functions to dynamically steer business performance. Previous generations of planning software have fallen short of this vision, making collaboration difficult to achieve, scattering data across multiple sources, and providing inflexible planning models that require heavy IT support. This landscape motivated Anaplan to develop an innovative platform that enables Connected Planning across the entire enterprise. The FSN Innovation Showcase highlights three major innovations that support these objectives: • Anaplan’s proprietary Hyperblock® technology • The App Hub, a suite of 250+ industry-leading solutions • Developments in machine learning and artificial intelligence
Tags : 
    
Anaplan
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Infosys BPM Ltd     Published Date: Feb 12, 2019
An effective rolling forecast is important to estimate long term financial plans. Every organization undertakes this process as a finance activity. However, when the forecasted data is examined on its effectiveness for decision making, more often than not the results are disappointing, and the rolling forecast process needs to be redefined. This paper talks about effective rolling forecasts that utilize resources, technologies, processes, and business intelligence to deliver actionable insights. A best-in-class matured RF process will enable CFOs to deliver great results through increased revenue and cost reductions, and create new benchmarks for the organization.
Tags : 
    
Infosys BPM Ltd
Published By: iCorps     Published Date: Jun 11, 2009
Finding the right IT service provider is not as simple as it may seem. Choosing a service provider based exclusively on low price may be good for your bottom line, but may fall short on delivering the right level of IT expertise and resource scalability for long-term advantage.
Tags : 
icorps, it service provider, it outsourcing, competitive advantage, roi, oursourcing, advantage
    
iCorps
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Mar 05, 2008
Because business success is tightly fused with technology, IT costs are rising, and this trend is expected to continue. As a result, businesses are demanding that IT be more than a static resource. IT is expected to deliver business results with a measurable contribution to the organization's bottom line.
Tags : 
asg, cmdb, bsm, itil, paradigm, btsm, sla, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Published By: InsideUpbg     Published Date: May 21, 2015
I. What is Payroll Accounting? II. Does Your Business Need to Outsource Payroll? III. What About Payroll Accounting Software? IV. In-House vs. Outsourced Payroll V. Consideration VI. Glossary
Tags : 
    
InsideUpbg
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.