HIT Consultant Insightful coverage of healthcare innovation
 

think data

Results 101 - 125 of 192Sort Results By: Published Date | Title | Company Name
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
    
Oracle
Published By: Workday     Published Date: Feb 01, 2019
"Are you spending more time aggregating and reconciling data than analyzing it? We uncovered the main roadblocks that are keeping finance and analytics apart, and they’ll have you rethinking the role of finance at your organization. View the infographic to get insight from more than 670 finance leaders on data intelligence."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Experian QAS     Published Date: Feb 25, 2013
According to a recent Experian QAS survey, 94% of respondents think that they have inaccurate customer data. Find out how respondents perceive data quality and how existing data errors affect the business and particularly the customer experience.
Tags : 
customer-centric, customer experience, data quality, customer data
    
Experian QAS
Published By: Aria Systems     Published Date: Sep 21, 2015
This guide will explain: Why recurring revenue is an unprecedented opportunity for your business and why this opportunity is available now How you'll need to change your thinking to manage a recurring revenue business Why creating recurring reveune offerings may be as simple as repackaging existing products and services What business and system capabilities you will need to have in place to support your new business model How to go about selecting vendors to help you achieve your goals What elements are necessary for success in a recurring revenue implementation program How recurring revenue changes the way you look at data and measure success The steps you need to take to get started on your recurring revenue journey What the future holds for recurring revenue
Tags : 
    
Aria Systems
Published By: Aria Systems     Published Date: Sep 21, 2015
This guide will explain: Why recurring revenue is an unprecedented opportunity for your business and why this opportunity is available now How you'll need to change your thinking to manage a recurring revenue business Why creating recurring reveune offerings may be as simple as repackaging existing products and services What business and system capabilities you will need to have in place to support your new business model How to go about selecting vendors to help you achieve your goals What elements are necessary for success in a recurring revenue implementation program How recurring revenue changes the way you look at data and measure success The steps you need to take to get started on your recurring revenue journey What the future holds for recurring revenue
Tags : 
    
Aria Systems
Published By: Aria Systems     Published Date: May 03, 2016
In the guide, I’ll explain: - Why recurring revenue is an unprecedented opportunity for your business and why this opportunity is available now - How you’ll need to change your thinking to manage a recurring revenue business - Why creating recurring revenue offerings may be as simple as repackaging existing products and services - What business and system capabilities you will need to have in place to support your new business model - How to go about selecting vendors to help you achieve your goals - What elements are necessary for success in a recurring revenue implementation program - How recurring revenue changes the way you look at data and measure success - The steps you need to take to get started on your recurring revenue journey - What the future holds for recurring revenue
Tags : 
    
Aria Systems
Published By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility
    
Enterprise Mobile
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
    
Flexera
Published By: Workterra     Published Date: Nov 10, 2017
Mid-market HR today is being asked to be a business partner in areas that range from compliance to employee engagement. They need to be able to connect the dots among various sources of employee data to deliver better-informed business decisions to help achieve strategic goals. Connecting those dots and delivering those results demands more HR firepower and greater data visibility than the manual or homegrown processes and systems often used by mid-market organizations can deliver. On the other hand, most mid-market companies aren’t ready for the intricacies or expense of human capital management (HCM) systems designed for enterprise-level organizations. The answer for forward-thinking HR leaders who want to boost their team’s capabilities and play a greater role in their company’s future is having core HR functionality designed into an integrated benefits administration solution. Automated HR that delivers core HR features as part of its architecture — not as an afterthought or a separate, stand-alone module — gives HR leaders: • The tools they need to better handle their administrative work • The data and analytics necessary to better coordinate programs and more confidently make strategic decisions • A user experience that makes life easier for HR and employees
Tags : 
    
Workterra
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts
    
Tenable
Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups
    
VMware
Published By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
Citrix Systems
Published By: HP and AMD     Published Date: Nov 30, 2011
HP Thermal Logic represents a step forward in thinking about and managing the energy consumption of today's datacenter. Find out more now!
Tags : 
network, edge, core, datacenter, energy, energy consumption, smart grid, data center
    
HP and AMD
Published By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : 
dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
    
McAfee
Published By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : 
data center, it decision making, data center operators
    
Compass Datacenters
Published By: Adobe     Published Date: Jun 26, 2019
Get inside the minds of key decision-makers in mid-size companies who are tackling today’s biggest content management challenges. Learn how they’re thinking, what they see as opportunities, and how they’re planning to come out on top. With more than 7,000 CMS solutions available from more than 6,000 unique suppliers, you have a mind-boggling array of options — making it hard to know which path to take and how to decide. Here's your chance to get inside the minds of key decision-makers who are tackling today’s biggest content management challenges: - Personalization - Keeping up with current technology - Difficult-to-use content management systems - Over-reliance on IT teams for simple functions - Inadequate access to customer data and insights - Integrating third-party apps - Managing and optimizing content
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Put your data in the hands of those who need it most, so they can act quickly to deliver great customer experiences. And a better bottom line. Data is no longer the domain of a few. Everyone in your organization should be thinking about it. And more importantly, acting upon it. This means taking data insights out of the realm of data scientists and making them a natural part of everyone’s workflow — from the marketing department to the executive team. To seize and capitalize on the data you already have, it’s important for analysts and marketers to rethink data—shifting from a reporting mindset to an action mindset. 74% of organizations want to be data driven, yet only 29% say they’re good at connecting analytics to action.
Tags : 
    
Adobe
Published By: FICO     Published Date: Mar 02, 2018
The role of analytics in managing, improving and ultimately transforming supply chains cannot be understated. But what about the analytics themselves? FICO’s Zahir Balaporia and renowned author Tom Davenport use the term “The Analytics Supply Chain” to reflect that the actual analytics themselves parallel supply chains, with inherent challenges and problems if things “get stuck.” Rethinking analytics in these terms can not only improve supply chain performance, but also any other business problems you seek to solve. This article targets: · Steps in the analytics supply chain and the vital role of data and analytic models · How your predictions, recommendations and insights need to rely on similar attributes to finished manufactured products; · Key questions to ask yourself in determining where you need to fix your analytics supply chain.
Tags : 
supply, chain, analytics, employee, optimization, organisations, productivity
    
FICO
Published By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
    
Cloudian
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.