HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 401 - 425 of 5233Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
    
BlackBerry Cylance
Published By: Intel     Published Date: Apr 15, 2019
There’s never been a more urgent need for comprehensive security and surveillance solutions. GeoVision Inc. has built its business on helping meet this need, providing digital and networked video surveillance solutions to customers in 110 countries. To succeed in its highly competitive and fast-changing industry, GeoVision must always be on the lookout for ways to give its customers leading-edge performance. Find out how GeoVision is working closely with Intel to maximize the performance of the hardware using the tools in Intel® System Studio, a comprehensive development tool suite to optimize the computer vision and deep learning workloads.
Tags : 
    
Intel
Published By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : 
locator, uberall, store locator, location marketing, local listings
    
Uberall
Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall
Published By: MicroStrategy     Published Date: Apr 11, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Published By: Kindred Hospital Rehabilitation Services     Published Date: Apr 10, 2019
Many healthcare providers are seeking support from dedicated rehabilitation partners. Receiving support from a third-party team of rehab experts enables healthcare providers to reach the highest levels of performance in this niche and highly-regulated space. While the landscape has never been as challenging, there is also great opportunity. When identifying a rehabilitation partner, there are five key qualities that indicate long-term success. This article outlines how rehab partners can support healthcare providers, the key qualities to look for in a partner and the top questions to ask a potential partner.
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: Workday APAC     Published Date: Apr 10, 2019
"Looking to start the evaluation process for a new technology provider and unsure where to start? We can help. This complete guide for midsize organizations walks you through how to prepare for your evaluation and what your company should look for in a vendor, so you can be confident in your search and selection. Read the guide to benefit from the insight of hundreds of customers who have been through the evaluation process."
Tags : 
    
Workday APAC
Published By: SailPoint Technologies     Published Date: Apr 10, 2019
With health data breaches increasing 70% over the past seven years,* it has become obvious that identity needs to be at the heart of your security program. Find out how you can protect access, maintain compliance and reduce risk with SailPoint.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Apr 10, 2019
Did you know 58% of healthcare data breaches are caused by malicious intent or negligence of organizational insiders?* Read this HIMSS Media study to learn where security gaps may exist in your organization and what you can do to reduce risk.
Tags : 
    
SailPoint Technologies
Published By: Anaplan     Published Date: Apr 09, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: HireVue     Published Date: Apr 09, 2019
The best graduate talent can come from anywhere. This isn’t to say you can’t have a shortlist of “top schools” - but you should make every eort to cast as wide a net as possible. A college recruiting process that doesn’t scale misses out on the opportunity to increase workplace diversity, bolster employee retention, and select from a pool of the highest quality candidates.
Tags : 
    
HireVue
Published By: Intel     Published Date: Apr 09, 2019
Get a glimpse into the workshop hosted in Milan, Italy, where participants learn about industrial protocols and sensors, computer vision, time-sensitive networks, and more.
Tags : 
    
Intel
Published By: Datastax     Published Date: Apr 08, 2019
We live in the age of “multi”. Everything is becoming more complex, more “intelligent”, and more distributed. Hybrid cloud isn’t really the new frontier—some companies have been operating in a hybrid cloud environment for nearly a decade—the new frontier is learning HOW to take full advantage of hybrid cloud without creating data silos or busting the IT budget. Enterprises are, of course, always looking for ways to make their computer systems faster, more highly available, more fault tolerant, and simpler to scale. But in the age of “multi,” this is becoming harder and harder to do. Imagine running a social network with millions of U.S.-based users and millions of European users. You could host all your servers and data in the United States, but then all of your European users would have a slower experience using your application than their U.S.-based counterparts. You could host all your servers and data in Europe, but then the U.S.-based users would have a slower experience. An obvio
Tags : 
    
Datastax
Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
If your bank is like many, it encrypts only a minimum of data. This is because many banks believe, incorrectly, that encrypting all data is unworkably cost- and resource-intensive on any platform. Encrypting piecemeal creates the need to carefully track where you are encrypting, what you are encrypting, and the time and resource costs of these activities.
Tags : 
    
Group M_IBM Q2'19
Published By: HERE Technologies     Published Date: Apr 04, 2019
Artificial Intelligence (AI) has already begun to improve targeting, segmentation, media buying and planning in the advertising industry. AI algorithms can extract complex patterns from vast numbers of data points, and in so doing, are able to self-correct and learn patterns. The revenue potential that improved personalization, segmentation and targeting that AI provides to marketers is huge. At HERE Technologies, we are placing AI and machine learning at the center of our products and services. We see the opportunity in automated machine learning to enrich the targeting and effectiveness of mobile advertising campaigns in real time. But the outcome of implementing such technology depends on the quality of data being fed into it from the outset. AI wouldn’t be as helpful if it’s being used alongside questionable location data or audience data. HERE’s location data provides a strong thread that can be woven throughout every stage of the media buying process, offering more context and
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Published By: PwC     Published Date: Apr 03, 2019
Not so very long ago, corporate executives commuted to a gleaming headquarters building, often in a beautifully landscaped suburban campus. Greeted by attentive security guards and smiling receptionists, they walked down well-appointed hallways lined with mahogany paneling and expensive artwork to their offices on the executive floor. There, they reviewed petitions that had percolated up the ladder, and dispatched decisions to be executed by the army of troops on the front lines. After decades of hard work, these individuals had ascended to the top of their pyramid, overseeing the processes and practices that made the enterprise work, and enjoying all the perquisites and power of a C-suite functional officer in the corporate center of a major company.
Tags : 
    
PwC
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. That’s an indisputable fact. There are some places though, where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur – a mere relic – maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
    
CheckMarx
Published By: Anaplan     Published Date: Apr 02, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q2'19
Published By: Here Technologies     Published Date: Apr 02, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
Here Technologies
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.