HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 1 - 25 of 552Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Apr 23, 2019
Schneider Electric surveyed over 400 worldwide machine builders and factory end users in 2015. The questions they answered all centered around what their machines and plants would need to look like in 2020 if their businesses were to sustain growth and boost productivity. Their feedback has shaped (and will continue to shape) Schneider Electric digitized solution investments. Key requirements identified included: • Tools that could accommodate a younger, less skilled, and less experienced workforce • A need for simpler integration through open software connectivity and more open field buses • A need for whole lifecycle support of the products they purchase Read this eBook to see answers to some of these identified key points from those surveyed.
Tags : 
machine, digitization, industry 4.0, business models, smart machines
    
Schneider Electric
Published By: SAS     Published Date: Nov 16, 2018
Fraud is costing government programs more than ever. For example, Medicaid lost $36 billion in 2017 – 10 percent of its total expenditures – which represents a 27 percent increase over 2015. As explored in this paper, fraud numbers are on the rise because fraud rings are not only getting more effective at what they do, but because it’s easy for them to find soft targets across multiple government programs simultaneously. Learn about how next-generation analytic tools from SAS cut across data and program silos and empower investigators to go on the offensive with fraud operators – without disrupting the efficient and timely delivery of benefits, services or tax refunds.
Tags : 
    
SAS
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Emid is a leading provider of managed ICT solutions and a pioneer of cloudbased banking systems in Africa. Based in Pretoria, Emid began as part of a major South African retail bank, providing core banking capabilities for other financial providers, and was acquired in 2015 by EOH, the largest technology service provider in Africa. Today, Emid provides managed services including networking, infrastructure, and IT support for businesses across industry sectors, as well as offering its C4 cloud-hosted, core-banking omni-channel platform.
Tags : 
    
Group M_IBM Q418
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The use of SaaS applications within an organization is the new normal. In fact, there's a good chance that just your marketing department alone is using over 10 SaaS products. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double to $67.2 billion by 2019. Integration needs are changing, with SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels all new integration points that will need to be captured in your business processes. Read “Five Principles for Integrating Software as a Service Applications” to learn: Key principles for successful hybrid integrations New integration use cases to grow your business upward and outward The why and how of integration as both an enabler and a differentiator Benefits of the TIBCO integration platform and its various offerings
Tags : 
    
TIBCO Software APAC
Published By: Workday Italy     Published Date: Aug 07, 2018
What is the current state of cloud adoption for Financial Applications? Financial applications have been slower to move to the cloud compared to other domains such as human capital management and procurement. However this is changing, Gartner predicts that within 4 years, 47% of total expenditure on financial management applications will be on cloud applications. That will be up from 30% in 2015. We have included four reasons why we see this tipping point happening right now.
Tags : 
    
Workday Italy
Published By: Microsoft     Published Date: Jul 20, 2018
Kevin Ashton founded the Auto-ID Center at the Massachusetts Institute of Technology, and has done pioneering work in radio-frequency identification and sensor technology. Ashton is known for coining the term “the Internet of Things” to describe a system where the Internet is connected to the physical world via ubiquitous sensors. In 2015, he spoke at a European customer service conference and noted that field service management is the first industry being transformed by IoT. Some people in the industry have noted that the entire IoT concept came from trying to solve field service problems in 1999. IoT’s origin story lies in field service management. Clearly, field service management and IoT are deeply intertwined. But how are the changes being implemented? And how can you benefit from them?
Tags : 
    
Microsoft
Published By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
    
Alight Solutions
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : 
data, breaches, organizations, global
    
LogRhythm
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: TIBCO Software APAC     Published Date: May 31, 2018
The use of SaaS applications within an organization is the new normal. There is a good chance that just your marketing department is using more than 10 SaaS products, which is reflected in the amount you are spending on SaaS. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double that to $67.2 billion by 2019.1 Clearly, your integration needs are changing. SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels are new integration points that will need to be captured in your business processes. This paper presents five principles for successful hybrid integrations.
Tags : 
    
TIBCO Software APAC
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: B Channels     Published Date: Apr 27, 2018
The IoT World Forum regularly reviews and updates on IoT markets and solutions every year. In Dubai in 2015 there were 3 clear takeaways: Invest now, gain solution skills, build an ecosystem.
Tags : 
    
B Channels
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn how to break down silos, reinvent productivity, and help your sales team achieve success by unifying transactional systems, social networking, and strong customer relationships. Download this free Nucleus report that says teams using the Microsoft Relationship Sales solution increased productivity 12-15 percent.** You’ll also learn how to: Empower your sellers with savvy insights that engage and delight customers. Scale the power of one-on-one relationship selling by unifying the sales experience. Offer your team tools to reinvent the way they sell and help transform your company’s bottom line. Use Microsoft Dynamics 365 for Sales along with LinkedIn Sales Navigator to help sellers identify future customers and suggest ways to engage with them. **Claims based on a 2017 study by Nucleus Research that analyzed more than 50 ROI case studies on CRM deployments from 2015 to 2017. Companies ranged in size from small and medium-sized businesses to large multinational enterprises. Re
Tags : 
    
Microsoft Azure
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Intercom     Published Date: Apr 05, 2018
This was our thinking when we began publishing a companion podcast to this blog in the summer of 2015. A blog is an ideal channel when your audience is glued to a screen, actively looking for new information they can quickly read or scanning Twitter for headlines. But what about during a morning office commute? An evening run? A weekend break from the MondayFriday grind of desk work?
Tags : 
    
Intercom
Published By: Rosetta Stone     Published Date: Apr 03, 2018
Manufacturing is a prominent pillar of American growth and prosperity. According to the National Association of Manufacturers, every $1 invested in the manufacturing sector returned $1.81 to the economy in 2015.
Tags : 
    
Rosetta Stone
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Pure Storage     Published Date: Mar 15, 2018
Managing technology refreshes is not a popular task among enterprise storage administrators, although it is a necessary task for successful businesses. As a business evolves, managing more data and adding new applications in the process, enterprise storage infrastructure inevitably needs to grow in performance and capacity. Enterprise storage solutions have traditionally imposed limitations in terms of their ability to easily accommodate technology refreshes that keep infrastructure current and operating reliably and most cost effectively. In 2015, Pure Storage introduced a new technology refresh model that has driven strong change in the enterprise storage industry by addressing the major pain points of legacy models and provided overall a much more cost-effective life-cycle management approach. In conjunction with other aspects of Pure Storage's enterprise storage product and services offerings, the company's "Evergreen Storage" technology refresh model has contributed to this all-f
Tags : 
    
Pure Storage
Published By: Oracle     Published Date: Mar 06, 2018
The financial system you are running today can probably trace its heritage back to the ‘80s and ‘90s. Since then, the needs of finance organisations have changed dramatically, but financial systems have failed to adapt at the core. Built to serve only the most basic requirements, these systems weren’t designed to meet the needs of today’s finance organisation. With CFOs today facing requirements very different from those they faced just a decade ago, Workday believes that finance organisations need applications built from the ground up based on today’s needs – not yesterday’s. They need modern financial systems. Workday Financials is the only financial management solution designed in the past ten years that incorporates the latest technologies, functionality, and design ethics at the core to address what modern finance organisations need. We discuss six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.