HIT Consultant Insightful coverage of healthcare innovation
 

any case

Results 1 - 25 of 292Sort Results By: Published Date | Title | Company Name
Published By: Shape Security     Published Date: Sep 12, 2019
A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes, including: Upgrade theft Two-factor authentication bypass Virtual calling When account takeovers became so common that the telecom provider received negative press about the situation, the company knew it needed to find a solution immediately. Download this case study to learn how the company was able to stop credential stuffing with Shape Enterprise Defense.
Tags : 
    
Shape Security
Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software
Published By: 3M     Published Date: Aug 30, 2019
The prevalent use of paints and coatings across many industries and organizations presents a variety of workplace hazards. In many cases, selection and use of appropriate personal protective equipment (PPE) is necessary to help control exposures. Respiratory and skin contact hazards are common across most applications. Depending on the type of paint or coating and the specific use conditions, other hazards may be present. These can include fire and explosion hazards, electric shock, fall hazards, excessive noise and other. Prior to selecting PPE for any painting operation, a hazard assessment completed by a qualified health and safety professional is necessary to evaluate exposure risks potentially present.
Tags : 
    
3M
Published By: ASME - Protolabs     Published Date: Aug 28, 2019
Over the past three decades, 3D printing has developed a reputation as an essential manufacturing process for prototype parts. Create a CAD model of your design, send it to your company’s printer, and a 3D replica will be ready in hours. Yet these parts are often little more than conceptual show-and-tell models, not durable enough for long-term use, and in some cases prone to degradation by sunlight. The winds of manufacturing are beginning to shift, however, and industrial-grade 3D printing, or additive manufacturing, is now encroaching on machining, injection molding, and other conventional manufacturing processes. This white paper explores the new and existing technology leaders in this area, and assesses the capabilities of production for each 3D printing process. Download your copy today!
Tags : 
    
ASME - Protolabs
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: SAP Concur     Published Date: Aug 07, 2019
"Decided you want - or need - an automated AP solution? AP automation lets you improve the way you manage and pay your vendor invoices. But full disclosure: we know it can be challenging for many people to drive accounts payable change within their business - especially when you're bogged down in your day-to-day tasks. That's why we built this guide. It'll help you lay the groundwork to plan, write, and present a business case that you can sell into your business leaders. This includes: Tips, data, templates, and worksheets for calculating ROI What information to collect and present Real-life “horror stories” How to corral your business case committee"
Tags : 
    
SAP Concur
Published By: AWS     Published Date: Aug 06, 2019
Old-guard database providers are expensive, proprietary, have high lock-in costs, and impose restrictive licensing terms. The challenge to date has been to achieve the same performance and availability of commercial-grade databases on open source databases such as MySQL, PostgreSQL, and MariaDB. Examine key considerations that go into any database migration decision and specific use cases—in Financial Services and Healthcare Analytics implementations—where Datavail carefully managed database migrations from traditional database providers to the cloud—and in particular Amazon Aurora. Download the eBook to learn about: Migration considerations and strategies including lift and shift, re-platforming, and re-factoring Security and compliance functionality enabled by Amazon Aurora Performance and scalability opportunities enabled by AWS
Tags : 
    
AWS
Published By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
Companies worldwide are undergoing digital transformations. By modernizing their applications, they can deliver better service to customers, and keep pace in a competitive landscape. In many cases, AWS has helped companies modernize by implementing containers—and initiating cultural shifts— to streamline development. In this eBook, we discuss best practices in containerization and how you can get started today with containers on AWS.
Tags : 
containers, developers, application, aws
    
Amazon Web Services EMEA
Published By: Cornerstone OnDemand     Published Date: Jul 09, 2019
Can you imagine having to convince company leadership to increase revenue? Well, that’s exactly what learning and HR leaders are having to do when it comes to investing in learning. Leadership just isn’t aware of the numbers that prove the business impact of learning on your company’s bottom line. Let Cornerstone help you build the case. Download of latest brief, “The business impact of learning”, and we’ll provide you with the stats and information you need to show why learning matters, why your company needs it, and what learning can do for your bottom line.
Tags : 
    
Cornerstone OnDemand
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
Valet Living is an amenity services company that supports the multifamily housing industry in over 40 states across the US. From in-home services such as cleaning, package delivery, laundry and pet care, to maintenance and grounds keeping work around apartment communities. Valet Living wanted to address the difficulties that arise when working with a dispersed and unconnected workforce. Since the implementation of Workplace by Facebook, Valet Living have seen great internal results such as: 20% increase in employee retention 50% increase in filling vacancies with internal candidates Thousands of dispersed workers connecting by sharing tips, goals and inspirations via team groups Download this case study to find out more about the amazing results.
Tags : 
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
"Campbell’s is more connected than we've ever been. We've seen a complete transformation in just 9 months. I think it's because Workplace has tools that people can use whenever and wherever they are.” Kristin Ennis, Senior Manager, Communications Download this case study to find out how Workplace by Facebook helped to improve the business with smarter communication, better collaboration and a re-imagined company culture.
Tags : 
    
Workplace by Facebook
Published By: IBM APAC     Published Date: Jun 21, 2019
Companies with multicloud services are outperforming their peers on a number of metrics — and achieving the key objectives that led them to the cloud services model. Take a look at the IT ecosystem of any company today and there’s a good chance you’ll find it includes offerings from several cloud services providers. That’s certainly the case at mid- to large-sized companies with at least 500 employees, according to a recent survey conducted by IDG Research. The survey of 100 senior IT professionals found that 59% are already multi-cloud adopters — that is, using computing and storage services from two or more cloud providers. Another 31% of respondents say they plan to become multi-cloud organizations in the coming 12-24 months, with only 10% still in the “consideration” phase. The survey results also reveal interesting insights into the drivers behind multicloud adoption. The perennial desire to reduce IT costs remains important, but the respondents rate two other factors.
Tags : 
    
IBM APAC
Published By: Workplace by Facebook     Published Date: Jun 20, 2019
Valet Living is an amenity services company that supports the multifamily housing industry in over 40 states across the US. From in-home services such as cleaning, package delivery, laundry and pet care, to maintenance and grounds keeping work around apartment communities. Valet Living wanted to address the difficulties that arise when working with a dispersed and unconnected workforce. Since the implementation of Workplace by Facebook, Valet Living have seen great internal results such as: • 20% increase in employee retention • 50% increase in filling vacancies with internal candidates • Thousands of dispersed workers connecting by sharing tips, goals and inspirations via team groups Download this case study to find out more about the amazing results.
Tags : 
    
Workplace by Facebook
Published By: AWS     Published Date: Jun 03, 2019
Companies worldwide are undergoing digital transformations. By modernizing applications, they can deliver better service to customers and keep pace in a competitive landscape. In many cases, Amazon Web Services (AWS) has helped companies modernize by implementing containers—and initiating cultural shifts—to streamline development. In this whitepaper, we discuss recommended best practices around containerization and how AWS can help you get started with containers today.
Tags : 
    
AWS
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology consulting company had 3-6 days Average TAT to resolve the tickets thereby having poor customer experience. LTI’s AI Solution helped in implementing Virtual Assistant Chatbot which was very well integrated with backend systems and enterprise systems to solve the challenges. Benefits i. 30% activities moved to Virtual Bots ii. L1 Support available “Always On” Model Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
Leading multinational corporation and technology company wanted to simplify, streamline and automate their highly complex & business-critical processes, and improve SLA compliance. LTI provided 24x7 support with distributed teams across the onsite/offshore locations. Our Design-Thinking-led approach for the next-generation platform, using Altassian Jira, helped connect the client’s multiple systems through microservice integration patterns. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: IBM APAC     Published Date: May 14, 2019
The perceived x86 benefits of lower acquisition cost and standardizing on are often made at the expense of performance, reliability, scalability and manageability. Moreover, many are driven by the impression that x86-based systems will solve all their computing challenges—when often that is not the case. This eBook looks at companies that chose to invest in IBM® Power Systems™ rather than continuing to run on or migrate to x86-based systems — and why.
Tags : 
    
IBM APAC
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
US Based multinational technology conglomerate were having too many business critical incidents and lot of manual efforts. Leveraging LTI’s Mosaic Discovery solution various issues were detailed out accordingly to identify impacting business processes. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
Leading technology consulting company had 3-6 days average TAT to resolve the tickets thereby having poor customer experience. LTI’s AI Solution helped in implementing Virtual Assistant Chatbot which was very well integrated with backend systems and enterprise systems to solve the challenges. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.