HIT Consultant Insightful coverage of healthcare innovation
 

delivering

Results 126 - 150 of 878Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jun 20, 2016
Retail has come a long way since the birth of ecommerce in the 1990s, as have consumer expectations. At its core however retail is still about one thing: ensuring the right products get to the right people when and where they are wanted. This report examines the role of a merchandising solution in delivering commerce anywhere.
Tags : 
retail, convergence, content management, best practices, ecommerce, business optimization
    
Oracle
Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk
    
IBM
Published By: Datastax     Published Date: Aug 23, 2017
About 10 years ago big data was quickly becoming the next big thing. It surged in popularity, swooning into the tech world's collective consciousness and spawning endless start-ups, thought pieces, and investment funding, and big data's rise in the startup world does not seem to be slowing down. But something's been happening lately: big data projects have been failing, or have been sitting on a shelf somewhere and not delivering on their promises. Why? To answer this question, we need to look at big data's defining characteristic - or make that characteristics, plural - or what is commonly known as 'the 3Vs": volume, variety and velocity.
Tags : 
datastax, big data, funding
    
Datastax
Published By: SAP     Published Date: Mar 25, 2011
Read this case study of how Switzerland's largest retailer, Coop, is delivering mobile commerce on the iPhone using SAP CRM. (Bloomberg Businessweek Research Services, 2011)
Tags : 
sap crm, loyalty, sales, iphone shopping app
    
SAP
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: SAS     Published Date: Jun 05, 2017
"The connected customer is an individual who is intimately connected to the data, outcomes, decisions and staff associated with any relationship to an organization.  To create personalized experiences, companies across all industries must pursue a more connected relationship with their customers through technology and processes focused on delivering relevant personalized experiences whenever possible. In this report, Blue Hill explores the key traits associated with supporting the connected customer through the internet of things, and provides guidance on why the internet of things will be essential across the general business landscape. "
Tags : 
    
SAS
Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing, remote video conferencing, video conferencing software, boyd video conferencing, video conferencing applications
    
Arkadin
Published By: Appian     Published Date: Jun 29, 2010
This Aberdeen Group report reveals that Best-in-Class organizations are delivering process management capability to their non-technical business users faster and more efficiently, and leveraging these optimised processes for a substantial reduction in operating cost and cycle time.
Tags : 
appian, bpm, business process management
    
Appian
Published By: Adobe     Published Date: Sep 16, 2016
There’s no doubt that your digital asset management system (DAM) can change everything when it comes to delivering the right customer experience at the right time. According to 78% of marketers, DAM is key to speed up time to market. It fast-tracks everything — from asset creation and management to campaign delivery. A next-generation DAM can turn your content marketing into compelling customer experiences. To learn more content marketing tips, read Breaking the DAM. ?
Tags : 
adobe, digital, digital asset management, dam, digital asset management system, customer experience
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2017
There’s no doubt that your digital asset management system (DAM) can change everything when it comes to delivering the right customer experience at the right time. According to 78% of marketers, DAM is key to speed up time to market. It fast-tracks everything — from asset creation and management to campaign delivery. A next-generation DAM can turn your content marketing into compelling customer experiences. To learn more content marketing tips, read Breaking the DAM.
Tags : 
dam. digital asset, management, asset management, asset creation, customer experience
    
Adobe
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : 
ge healthcare, clinical data, healthcare technology, image management technology, medical imaging, data management, information technology
    
GE Healthcare
Published By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images, information technology
    
GE Healthcare
Published By: Epicor     Published Date: Jan 16, 2018
Brookside Lumber—a Pennsylvania-based lumber and building materials (LBM) dealer—needed a new business software system that was flexible, open, user-friendly, and easily enhanced. They wanted a solution that could get them the data they needed to accomplish their goals in a timely manner. That’s where Epicor BisTrack came in. BisTrack helps LBM dealers achieve operational efficiencies by: • Matching workflow needs of LBM contractor yards • Automatically notifying users of necessary information • Delivering seamless, hands-on implementation • Quickly getting information out of the solution for special request • Providing optional add-on applications for business growth • Adapting to the way you do business • Servicing customers faster Read this case study to learn more about how Epicor BisTrack was able to help Brookside Lumber, and discover how it can also help your LBM business. Download the case study now.
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors, lumber manufacturers
    
Epicor
Published By: Siperian     Published Date: Jan 24, 2007
Discover the essential steps to delivering a solid business case for the right customer-centric MDM architecture and achieve maximum ROI.
Tags : 
roi, data management, return on investment, master data management, mdm, data integration, data quality, siperian
    
Siperian
Published By: CA Technologies     Published Date: Jun 04, 2015
Struggling with delivering new capabilities to the market in a timely manner? Start your DevOps journey now and learn how implementing Continuous Delivery solution can be the ultimate competitive differentiator for your business. Read this executive brief to learn: How to bring innovation and business value together more rapidly How to improve Communication and collaboration between development and operations teams How to improve quality and increase visibility to the application deployment process.
Tags : 
    
CA Technologies
Published By: B Channels     Published Date: Apr 27, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete IoT ecosystem capabilities. We see three steps to deliver IoT Channels success: 1. Partner Insights: Identify routes and partners for scalable loT, understanding market segments 2. Partner Journey: Find and engage partners in loT segments to nurture and grow 3. Partner Support: Build and deliver effective IoT partner ecosystem programs
Tags : 
    
B Channels
Published By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: SAP     Published Date: May 22, 2012
View this live Webcast from the Aberdeen Group that features senior research analyst for business intelligence Mike Lock. Learn how best-in-class companies are delivering broader access to information in a shorter time frame to facilitate substantial improvement in key business performance metrics.
Tags : 
crm-us12-onl-mlql
    
SAP
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks
Published By: F5 Networks     Published Date: Dec 10, 2014
Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.
Tags : 
f5 networks, devops, agile, netops, data center, virtualization, sdn
    
F5 Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.