HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 201 - 225 of 649Sort Results By: Published Date | Title | Company Name
Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers
    
Zebra Technologies
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
Business models are less durable than they used to be… [they] are subject to rapid displacement, disruption, and, in extreme cases, outright destruction. The basic rules of creating and capturing economic value were once very rigid. Companies tried to execute the same business models better than their competitors did. That doesn’t have to be the case anymore. Unlike product and service innovations, business-model innovations travel well from industry to industry
Tags : 
    
Oracle Commerce Cloud
Published By: Entelo     Published Date: Sep 06, 2017
We searched high and low to find every top recruiting and HR conference happening around the world between July and December of 2017. From London and Omaha, to Amsterdam and San Francisco, you'll find nearly 100 events to choose from. Inside you’ll find actionable intel to help you make informed, decisions about which conferences and events best fit your professional goals and organizational imperatives, including: The full rundown on conferences and meetups happening through the end of 2017, focused on recruiting, human resources, talent management, diversity and inclusion, and more Dates, locations, and cost breakdowns to make planning a cinch Keynote speakers and interesting sessions that we’ve got our eyes on Recommendations on who should attend each conference Which events Entelo will be attending, sponsoring or presenting Download your copy of the Ultimate Guide to start planning where you're headed this Summer and Fall!
Tags : 
    
Entelo
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Le vol et l’exploitation des identifiants administratifs sensibles entraînent des infractions et la perturbation des opérations. CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: Dell EMC     Published Date: Aug 22, 2017
Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. This session by Eric Seidman, Senior Manager, Product Marketing, Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World 2017. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
Tags : 
    
Dell EMC
Published By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le piège tendu par un imposteur est plus facile qu'il n'y paraît. Imaginez le scénario suivant : vous travaillez pour une importante société qui a récemment procédé à plusieurs acquisitions. Votre travail consiste à régler les factures. Un matin, vous recevez un message de votre PDG actuellement en déplacement. Il vous demande de virer des fonds afin de pouvoir entamer les négociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu'à la conclusion de l'accord.
Tags : 
directeur opérationnel, directeur financier, ressources humaines, service financier, gestion des salaires
    
Proofpoint
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Vorresti creare innovazione, accelerare la release delle applicazioni e approfittare di nuove opportunità: ma le applicazioni e le infrastrutture legacy ti ostacolano. Passa ad un'architettura moderna scomponendo applicazioni monolitiche in microservizi agile, creati, gestiti e ridimensionati in modo indipendente. Il tuo business potrà muoversi più velocemente e gli sviluppatori apprezzeranno la semplicità di accesso alle API, che consentirà loro di concentrarsi sulla customer experience.
Tags : 
ca technologies, innovazione, microservices, microservizi, api, customer experience
    
CA Technologies EMEA
Published By: CrowdStrike     Published Date: Aug 01, 2017
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider,to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.Before initiating a change from your current AV solution read this guide to learn:?How to plan an AV replacement project and the critical elements to consider ?How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions?What prevalent technologies are available and what are the pros and cons of each??How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results?Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
    
Q2 eBanking
Published By: Bizible     Published Date: Jul 25, 2017
Marketing ops is poised for another major evolution, cementing their role as revenue drivers. Download this ebook to learn more about Revenue Ops and how marketing & sales operations make growth possible.
Tags : 
marketing operations, revenue operations, revenue attribution, b2b marketing operations, marketing analytics
    
Bizible
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, personalisierten und erstklassigen Service.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, personalisierten und erstklassigen Service.
Tags : 
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kunden- und Neukundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, mit Kontext angereicherten Verkauf.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global
Published By: IBM     Published Date: Jul 13, 2017
Learn about a solution for electronics manufacturers to promote greater efficiency and profitability, as well as consumer satisfaction. The full spectrum of IoT electronics consists of Medical Devices, Consumer electronics and appliances, network equipment providers and many more. “These “smart, connected products”—made possible by vast improvements in processing power and device miniaturization and by the network benefits of ubiquitous wireless connectivity—have unleashed a new era of competition.”
Tags : 
iot, electronic industry, technology advancement, medical devices, greater efficiency, consumer satisfaction, data driven
    
IBM
Published By: Thales     Published Date: Jul 13, 2017
Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.
Tags : 
thales, data protection, health records, data security, hippa, health information exchange (hei), privacy and security, electronic health records
    
Thales
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: DellEMC and Intel®     Published Date: Jul 05, 2017
La tecnologia Flash sta rivoluzionando il mondo La tecnologia Flash favorisce l'innovazione e la trasformazione del business consentendo alle aziende di svolgere operazioni semplicemente irrealizzabili prima d'ora. Gli innovatori, il gruppo con la più elevata adozione della tecnologia Flash, possono contare su risultati di business superiori in diversi settori. Vedono una maggiore crescita in termini di entrate, redditività e produttività e usufruiscono di un time-to-market più breve per i nuovi prodotti. Processore Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, il logo intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.