HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 5101 - 5125 of 5314Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
If a retailer views “Buy Online, Pickup In-Store” as purely e-commerce, they’re losing. Each transaction in which customers pickup in-store is a chance to add value to the relationship. Whether that means speed, cross-selling, or a unique bit of customer service that amplifies the visit, BOPIS plays just as important a role as the rest of the brick-and-mortar experience. Some trips may not translate to additional purchases right then and there, but the way a retailer handles pickup can dictate how the customer feels about the brand. To get the most out of BOPIS, retailers should ask themselves a few important questions.
Tags : 
    
Group M_IBM Q3'19
Published By: Autodesk     Published Date: May 22, 2017
The future of making things is here, and it is complex. Engineering leaders are under constant and growing pressure to find more innovative solutions for increasingly demanding customers in the context of an extremely competitive global market.
Tags : 
additive manufacturing, generative design, simulation, high-speed manufacturing, smart manufacturing, enhanced customization, innovation, rapid prototyping, sustainable operation, cam, high-speed machining, tooling, job shop
    
Autodesk
Published By: Stratus Technologies     Published Date: Dec 05, 2008
Today's hottest technology has its roots in the mainframe era. Are there lessons to be learned from the past?
Tags : 
stratus technology, virtualization, mainframe, server
    
Stratus Technologies
Published By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, ibm big sql, sql, database management, database management technology, software, tables, queries, data platform, big sql architecture, programming language, relational database management system, rdbms
    
IBM
Published By: SAP     Published Date: Mar 25, 2011
SAP Insider Article covering new SAP CRM innovations which help companies empower their employees, substantially improve the customer experience, and thereby achieve a competitive advantage.
Tags : 
competitive advantage, sap crm, customer experience, customer experience advantage
    
SAP
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform purpose-built for heterogeneous multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
    
BlackBerry Cylance
Published By: xMatters     Published Date: Oct 23, 2014
In many organizations, the IT team ushered in the first generation of primitive mobility, issuing pagers to on-call teams and guardians of key corporate systems. And while today, the vast majority of our pagers have been upgraded to smart phones and intelligent devices, many of them are used for little more than prompting us to log into a desktop system or dial a phone. This paper outlines six strategies for extending mobile devices beyond notification to workflows and robust productivity tools within your IT organization.
Tags : 
mobile, generation, mobility, on-call, team, corporate system, pagers, smart phones, devices, tools, desktop, dial, phone, strategy
    
xMatters
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"The percentage of consumers making purchases online has officially outpaced those who don’t. But what does this mean for brands? Once tethered largely to wholesale and resale, the door has been opened for brands to try a variety of selling options. And they are. The time is now for brands to step into the e-commerce game and figure out the best approach for them. In this white paper, we’ll dive into six critical components that all brands should be watching as the industry evolves: - Customer connections - Relationships with retailers - Quality of product content - Marketplace management - Social commerce influence - Big data for brands"
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, manufacturer, marketing
    
ChannelAdvisor
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Symantec     Published Date: Jun 19, 2015
Learn how employees are putting your intellectual property at risk and see how there is a growing problem of intellectual property theft in the workplace by understanding the mindset of employees that take corporate assets.
Tags : 
intellectual property, cyber criminals, sensitive data, security initiatives
    
Symantec
Published By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
    
Looker
Published By: OutSystems     Published Date: Jan 29, 2014
Application Development and Delivery. When and Where to Leverage the Cloud
Tags : 
outsystems, cloud, cloud computing, application development, application delivery
    
OutSystems
Published By: Cisco     Published Date: Dec 27, 2017
Today all businesses battle with unprecedented competitive pressures. In order to succeed—or even survive— they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. The very factors driving digital transformation in businesses are also pressuring IT organizations to transform. Customer expectations have increased. Companies live and die by the applications they provide to their customers and employees. A smartphone is the modern bank branch. The palm of your hand is replacing traditional brick-and-mortar stores. Access without delay or interruption, 24/7, is the new normal. If they can’t get what they want, when they want it, customers go elsewhere.
Tags : 
    
Cisco
Published By: FICO EMEA     Published Date: Aug 28, 2019
There is a proliferation of payment methods that provide people with faster ways to make and receive payments – but they are not all the same. Understanding the differences and unique characteristics of different 'fast' payment types is vital to those who need to develop and service payments fraud strategy. Download our executive brief to understand: The differences between real-time payment schemes, e-wallets and person to person payments The implications on fraud from the fast transfer of money Where to start building your real-time payments fraud strategy
Tags : 
real-time payment, p2p payment
    
FICO EMEA
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: Sitecore     Published Date: Jul 08, 2009
This whitepaper discusses the need to target outcomes and focus on building a complete, 360-degree view of your customers -- who they are, where they came from, what they do, and how you can best meet their needs.
Tags : 
sitecore, customer experience, lifecycle management, web content management, analytics, crm, emarketing, email marketing, cms, lead generation
    
Sitecore
Published By: Infosys     Published Date: May 22, 2018
When the opportunity emerged for one bank to acquire the other, the deal went through as quickly as regulations and compliance requirements would allow. As a result, no integration plans were in place at the time of acquisition. For a long time, the two companies continued to operate separately, albeit under a single name. This was particularly true of the mobile banking experience where two entirely different apps were in use. Since the two companies delivered complementary services, there was an opportunity to cross-sell to customers who might require the services of both; but only if they could deliver a seamless experience. We were invited to tackle the challenge of creating an integrated banking app experience across both companies.
Tags : 
banking, finance, app, technology
    
Infosys
Published By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
    
PGi
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Riversand     Published Date: Oct 30, 2017
MDM can add value to the business in many different ways. It most often does so indirectly, as an enabler for other business and IT initiatives. Some of these areas of potential benefit support shorter-term or tactical efforts at helping the business operate more efficiently — that is, they help to reduce the cost bases to "run the business." Some benefit areas of MDM are related more to helping users "grow the business." That is, they help to increase the revenue and market share within a given business model or framework. Yet other areas of opportunity fall into the "transform the business" arena — for example, allowing customer support representatives to perform inside sales activities enabled by trusted customer and product master data.
Tags : 
    
Riversand
Published By: IBM     Published Date: Jun 20, 2017
Watch this on-demand webinar for a look at in-memory databases and better understand the advantages of in-memory vs. disk-based technology.
Tags : 
data integration, data security, data optimization, data virtualization, in-memory, disk-based, technology
    
IBM
Published By: Northeastern University     Published Date: Oct 01, 2015
Looking for a career change or considering the ways to maximize your career growth? Pursuing an advanced degree could help you achieve your full potential in your current career, or even help you forge a new career path within some of today’s highest-demand industries. Explore this helpful guide, brought to you by Northeastern University, to learn about the latest job-industry trends, benefits of a graduate degree, and tips for paying for school. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University
Start   Previous    196 197 198 199 200 201 202 203 204 205 206 207 208 209 210    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.