HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 1 - 25 of 448Sort Results By: Published Date | Title | Company Name
Published By: 3D Systems     Published Date: Feb 28, 2019
Persone, hardware e software giusti per garantire la qualità sempre La qualità e l'affidabilità non sono mai state così important come ora. Nell'odierno ambiente ipercompetitivo le aziende non possono permettersi di rimanere indietro circa la qualità dei loro prodotti. E non si può tornare indietro quando si tratta di adottare nuovi strumenti e tecnologie per garantire la qualità sempre. Negli ultimi due decenni la scansione 3D è diventata uno strumento cruciale nella fase di misurazione e ispezione in manifattura. È una tecnica metrologica in cui si nutre fiducia per la sua accuratezza, affidabilità, velocità e facilità di utilizzo. La sua natura "senza contatto" e la sua eccezionale flessibilità la rendono ideale per la misurazione di una vasta gamma di parti in una grande varietà di situazioni. Un approccio efficiente alla scansione 3D consiste nel trovare l'hardware e il software adatti per ogni utente in modo da soddisfare meglio le esigenze di misurazione dell'azienda. Questo eBo
Tags : 
    
3D Systems
Published By: Aberdeen Group     Published Date: Sep 11, 2012
IBM® Tivoli® Netcool®/OMNIbus is a "manager of managers" designed to collect and correlate events from a broad spectrum of infrastructures, providing a "single pane of glass" view into the performance of the entire IT and business infrastructure.
Tags : 
business technology, ibm, aberdeen, manager, business infrastructure, it management
    
Aberdeen Group
Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
IBM® Tivoli® Netcool®/OMNIbus is a "manager of managers" provides a "single pane of glass" view into the health and performance of the entire IT and business infrastructure.
Tags : 
business technology, ibm, aberdeen, manager, business infrastructure, it management, application performance management, business intelligence
    
Aberdeen-IBM
Published By: Acquia     Published Date: Aug 03, 2009
Not doing Social Publishing? You’re behind. Social technologies on the web have changed forever how organizations of all sizes interact with their customers to gather feedback, improve customer service, and protect and grow their brands. Effective web content management must now include social and community capabilities.
Tags : 
social publishing, acquia, customer service, brands, web content, social media, publishing, publish, journalism, blog, blogging, rich content, myspace, facebook, orkut, meebo, wikis, forum, tagging, twitter
    
Acquia
Published By: Act-On     Published Date: Apr 29, 2016
Top-performing marketing leaders understand the need to allocate their time and resources across the entire spectrum of marketing, acknowledging that an effective marketing strategy goes well beyond just driving demand for sales.
Tags : 
marketing, business development, sales, business practices
    
Act-On
Published By: Adobe     Published Date: Feb 09, 2016
Marketing is changing. The traditional model, which saw the customer path as a linear funnel, is broken. Today, customers follow whatever path they want, and you’re expected to reach out to them on their terms.
Tags : 
marketing, marketing strategies, marketing trends, customer experience, data, customer relationships
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Im Zuge der Entwicklung des digitalen Ökosystems um das traditionelle Marketing entstanden isolierte Abteilungen, was unterschiedliche Botschaften, Kampagnen und Erlebnisse zur Folge hatte. Zur Schaffung einheitlicher und ansprechender Erlebnisse auf allen Kanälen ist großes Engagement im gesamten Unternehmen erforderlich.
Tags : 
marketing, customer experience
    
Adobe
Published By: Adobe     Published Date: Jan 22, 2017
Marketer im Finanzdienstleistungssektor haben im Lauf der Zeit schon viele hervorragende Akquisestrategien kommen und gehen sehen. Einst standen Filialen im Zentrum der Akquise, und das aus gutem Grund. Der persönliche Kundenkontakt bot Unternehmen einen bedeutenden Vorteil beim Ermitteln der Kundenbedürfnisse und beim Empfehlen der richtigen Produkte. Es war möglich, Kunden zu befragen, nachzuhaken, ihre Wünsche festzustellen und sie sogar dazu zu bewegen, an Ort und Stelle auf ihr Konto einzuzahlen.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 02, 2017
Die Möglichkeit zur schnellen Erstellung und Bereitstellung professioneller Personalunterlagen verschafft Unternehmen einen entscheidenden Wettbewerbsvorteil, wenn es darum geht, Fachkräfte zu gewinnen und zu halten.
Tags : 
    
Adobe
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons aren’t possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Published By: Aerohive     Published Date: Oct 14, 2014
Möjliggör fördjupade och personanpassade inlärningsupplevelser som förhöjer produktiviteten och inför en ny läroplansstandard i det moderna klassrummet.
Tags : 
cloud for education, personalised learning, mobility adoption in schools
    
Aerohive
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Zum Schutz eines Unternehmens und seiner Daten ist es unerlässlich, bei der Cybersicherheit vorauszudenken. In diesem E-Book erfahren Sie, wie Sie die bestehende Infrastruktur Ihrer Website oder Ihres Rechenzentrums mit verstärkten Sicherheitsmaßnahmen in der Cloud ergänzen können. Wir stellen die verschiedenen Ansätze zur Cloudsicherheit von Akamai sowie von anderen Anbietern vor. Daraufhin sehen wir uns einige häufig verwendete, aber leider oft missverstandene Kennzahlen an, damit Sie fundierte Entscheidungen treffen und die optimale Lösung für Ihr Unternehmen finden können.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Wir haben alle unsere persönlichen Lieblingsapps. Aber können Sie auch nur drei mobile Websites nennen, die Ihnen gefallen? Wohl nicht. Und das liegt daran, dass die Nutzererwartungen allzu häufig enttäuscht werden, wenn Webdesigns, die für Desktop-PCs konzipiert wurden, für Mobilgeräte nachgerüstet werden. Dennoch ist der Smartphone-Traffic höher denn je und steigt weiter an. Dieser Bericht von Forrester-Analysten zeigt, warum es höchste Zeit für einen radikalen Neuanfang ist und wie Ihre Website mit leuchtendem Beispiel vorangehen kann. Laden Sie den Bericht heute noch herunter.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Warum cloudbasierte Sicherheit für Unternehmensanwendungen so wichtig ist
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
    
Akamai Technologies
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements
    
AlienVault
Published By: Amazon Web Services     Published Date: Jun 02, 2017
Dem folgenden IDG Whitepaper können Sie entnehmen, warum 54% der Befragten für Ihre Cloud Strategie AWS adoptieren wollen. Mit AWS können Sie: - Ihre Agilität steigern - Neue Geschäftsanwendungen bereitstellen und vorhandene skalieren - Ihre Gesamtbetriebskosten (TCO) senken
Tags : 
cloud, cloud computing, business agility, business applications, microsoft, microsoft apps, aws, amazon web service
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
Amazon Web Services
Published By: Anaplan     Published Date: Sep 07, 2018
Sie können sich sicherlich noch an den Planungsprozess der letzten Jahre erinnern. An die vielen Spreadsheets, die vielen Überstunden und die Tatsache, dass die Pläne der verschiedenen Unternehmensbereiche und Abteilungen nicht wirklich miteinander vernetzt waren. Lesen Sie nach, warum Sie sich nicht mehr auf altmodische, unübersichtliche und überkomplizierte Spreadsheets verlassen sollten, wenn es um Ihre Planung geht. Anaplan wurde in der Studie “The Planning Survey 2017” von BARC in 21 von insgesamt 31 Bewertungskategorien auf den 1. Platz gewählt. In den übrigen 10 Kategorien hat Anaplan den 2. Platz erreicht – zum Teil weit vor den anderen Mitbewerbern. Speziell in den Kategorien “business benefits”, “planning functionality”, integrated planning” und “flexibility” konnte Anaplan durch erste Plätze überzeugen. Laden Sie sich Ihr persönliches Exemplar der Studie herunter und lesen Sie selbst nach, warum Anaplan so herausragende Ergebnisse bei den Anwendern erzielen konnte.
Tags : 
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.