HIT Consultant Insightful coverage of healthcare innovation
 

it decision makers

Results 251 - 275 of 288Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Oct 22, 2015
The Internet of Things (IoT) presents an opportunity to collect real-time information about every physical operation of a business. From the temperature of equipment to the performance of a fleet of wind turbines, IoT sensors can deliver this information in real time. There is tremendous opportunity for those businesses that can convert raw IoT data into business insights, and the key to doing so lies within effective data analytics. To research the current state of IoT analytics, Blue Hill Research conducted deep qualitative interviews with three organizations that invested significant time and resources into their own IoT analytics initiatives. By distilling key themes and lessons learned from peer organizations, Blue Hill Research offers our analysis so that business decision makers can ultimately make informed investment decisions about the future of their IoT analytics projects.
Tags : 
    
SAS
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis. The heart and soul of SAS Visual Analytics is the SAS® LASR™ Analytic Server, which ca
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 05, 2017
It’s there for the taking – real-time information about every physical operation of a business. All you need is a key: data analytics.  This paper is based on Blue Hill Research’s interviews of three organizations – a US-based oil and gas company, a US municipality and an international truck manufacturer – each of which heavily invested in IoT analytics. Focusing on the key themes and lessons learned from their initiatives, this paper will help business decision makers make informed investment decisions about the future of their own IoT analytics projects.
Tags : 
    
SAS
Published By: Schneider Electric     Published Date: Oct 17, 2016
In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
    
Schneider Electric
Published By: SEPATON     Published Date: Mar 11, 2008
Computerworld research unveils how enterprises are responding to growing data protection challenges. This report benchmarks how an organization’s data protection decisions impact business efficiency – based on a survey of enterprise IT decision-makers. Sponsored by SEPATON.
Tags : 
data protection, computerworld, backup, recovery, sepaton
    
SEPATON
Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization
    
SilverSky
Published By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : 
src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract, transform, load, spatial analysis, operational data stores, ods, spatial data, etl, cdi, point of sale, retail floor space management, rfsm, alteryx
    
SRC,LLC
Published By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : 
payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
    
Stripe
Published By: T Systems     Published Date: Nov 28, 2018
The wait is over. Here at T-Systems, we are proud to present the findings of CXP Group - a leading independent European research and advisory firm in the field of digital, software and IT services. Their new “Digital Industrial Transformation with the Internet of Things” report examines the dynamic range of opportunities that IoT holds for businesses and explores the challenges of integrating existing data processes with those that are IoT enabled. The report is the result of the feedback cultivated from interviews with senior business and IT decision-makers responsible for creating and running innovation strategies at 250 large-scale European manufacturers. The data has been disseminated by region, strategies, pain points, IoT adoption, intention, investment etc. and provides readers with a detailed examination of what industrial businesses look for most from IoT. The report provides a fascinating unearthing of influencing factors for IoT readiness and digitization as a whole. Using
Tags : 
industrial manufacture, iot, internet of things, iot adoption, european, digitization, digitization strategy, value chains, service providers, consultation, supply chain management, operational technology, data analytics, new business models
    
T Systems
Published By: Tenable     Published Date: Jan 25, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense
    
ThreatTrack Security
Published By: TIBCO Software     Published Date: Jul 22, 2019
Over the past decade there has been a major transformation in the manufacturing industry. Data has enabled a paradigm shift, with real-time IoT sensor data and machine learning algorithms delivering new insights for process and product optimization. Smart Manufacturing, also known as Industry 4.0, has laid the groundwork for the next industrial revolution. Using a smart factory system, all relevant data is aggregated, analyzed, and acted upon. We call this Manufacturing Intelligence, which gives decision-makers a competitive edge to: Digitize the business Optimize costs Accelerate innovation Survive digital disruption Watch this webinar to understand use cases and their underlying technology that helped our customers become smart manufacturers.
Tags : 
    
TIBCO Software
Published By: TigerConnect     Published Date: May 02, 2018
Hospitals and other care organizations are turning to clinical communication & collaboration solutions—often referred to as CC&C systems—as a way to improve care-team coordination and to expedite care delivery. But there’s an unexpected challenge with this journey. These clinical communication solutions are changing so rapidly, it’s not easy for IT decision-makers to be confident with their vendor selection. You want to pick the best system for your organization, but there are so many factors to consider. And the factors keep changing. At any moment, you don’t know what you don’t know. This Technical Buyer’s Guide is for you if: • You’re an IT professional in a healthcare organization that provides direct patient care. • Your organization is thinking of purchasing a new system to support clinical communications among your clinical and administrative staff. • You’re looking for technical details that will help you choose the best communication solution for your organization.
Tags : 
    
TigerConnect
Published By: Time Warner Cable Business Class     Published Date: Apr 04, 2016
This guide gives you an overview of the steps you need to build a foundation for sustainable growth—the kinds of investments, drivers and differentiators that are involved. It does so through the words and experiences of fellow decision makers who’ve overcome daunting technology challenges, and in doing so realized their greatest achievements. Use the guide to get ready for great achievements of your own.
Tags : 
time warner cable, business class, internet, voice, television, network services, cloud
    
Time Warner Cable Business Class
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : 
saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: TRUSTe     Published Date: Jun 07, 2010
This white paper will explore how marketing leaders and business decision makers like yourself can align trust, credibility and privacy processes in your organization-and your company's broader ecosystem-into a Business Integrity Strategy.
Tags : 
truste, endorsements, marks, seals, trust marks, branding, ecommerce
    
TRUSTe
Published By: ttec     Published Date: Jul 24, 2019
Let’s face it: in today’s B2B landscape, the buyers call the shots. Buyers today are proactive, research their own options, and often include many decision makers rather than just one who can be wooed on a golf course or over dinner. So, where does that leave the salesperson? To succeed in this new landscape, sales professionals must understand how the buyer’s journey has changed and unlock the advantages that data analytics and statistical modeling can offer. Sales and marketing teams must also learn how to align their efforts to present a truly coordinated experience. Read this paper to learn how to take advantage of untapped opportunities for helping sales teams evolve in today’s buyer-empowered landscape.
Tags : 
    
ttec
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most when making decisions, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom would indicate that “hard” elements, such as details around cost, quality and efficiency, are more compelling to decision-makers, this new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, senior executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they primarily relied on to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata
    
Varonis
Published By: Veeam '18     Published Date: Dec 04, 2018
"In today’s era, organizations are increasingly adopting multiple cloud services, including public, private, and hybrid clouds, to meet increased agility, innovation and cost management goals. Veeam ensures availability in these environments by providing data protection to, from, and within multi-cloud environments. ESG led a research among IT decision makers to better understand the extent to which multiple cloud service providers are being used today and how that influences the use of on-premises and hybrid cloud environments in the future. Read this ESG brief to learn more about: • The current trend in multi-cloud adoption for large companies • The future of on-premises IT environment • How the Veeam Availability Platform delivers the next generation of availability for the always-on enterprise • And more! "
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
    
Veeam '18
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.