HIT Consultant Insightful coverage of healthcare innovation
 

utilize

Results 126 - 150 of 235Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 24, 2013
Today, the retail industry faces daunting challenges as a result of current uncertain economic conditions, conflicting market influences and changes to financial reporting standards. Traditional point solutions utilized in the various phases of the real estate life cycle are no longer adequate to meet these challenges. This whitepaper examines the benefits of implementing life cycle management solutions in the retail environment.
Tags : 
lifecycle management, real estate systems integration, real estate, retail, retailer, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace
    
IBM
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Dive into this detailed case study to learn how Callaway Golf utilized SAP HANA with Lenovo to optimize their supply chain, get products to market faster, and maintain a competitive advantage. Get the case study now.
Tags : 
lenovo, lenovo and callaway golf, callaway golf, sap hana, lenovo sap hana, optimize supply chain, competitive advantage, market faster
    
Lenovo and Intel®
Published By: Meltwater     Published Date: Jan 16, 2015
Your customers and competition are talking. Are you listening? Social listening is the most significant technology to hit marketing since social media itself. But marketing isn’t the only department that can utilize social listening: your entire business organization can use social listening to inform its programs, products and business decisions.
Tags : 
meltwater, social media monitoring, media monitoring, social media analytics, media analytics, pr software, social marketing software, social marketing listening, media listening
    
Meltwater
Published By: Apptio     Published Date: Jul 16, 2019
Get the poster that maps AWS, Azure, and GCP services to a standard IT taxonomy. The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Download the Cloud Cost Management Poster for best practices to: - Map AWS and Azure billing to a standard taxonomy - Better understand cloud costs and usage to avoid surprises and drive accountability - Optimize resources by taking action on underutilized and idle instances
Tags : 
    
Apptio
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: IBM     Published Date: Oct 10, 2013
Virtualization is one of the most highly demanded of all IT projects this decade because it enables enterprises to reduce capex and opex costs and at the same time increase business efficiency and agility. However, implementing, supporting, and managing virtualization can often be difficult tasks, especially as deployments increase in scale and complexity and impact more areas of the datacenter. These more complex infrastructures often require highly skilled engineers with in-depth business knowledge and systems management capabilities. Projects such as infrastructure optimization and automation initiatives for self-service provisioning are key because they enable enterprises to streamline business processes and utilize cloud strategies and mobility solutions. IDC shows how partnering with experts who can implement, optimize, support, and manage virtualized environments may be the right course of action. By utilizing partners, enterprises will be able to avoid some of the potential pit
Tags : 
virtual environment, business initiatives, maximize initiatives, datacenter, complex infrastructure, business efficiency, business agility, deployments, automation initiatives, cloud strategies, mobility solutions
    
IBM
Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services
    
123Together
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Windows Server 2008 Hyper-V, Microsoft’s next generation hypervisor technology, adds an exciting new dimension to the server virtualization market. With Hyper-V and Microsoft’s integrated Server Management suite, you can take advantage of a powerful set of tools to help simplify infrastructure management and better utilize your hardware investments.
Tags : 
dell, windows server 2008, hyper-v, hypervisor technology, virtualization, server management, server virtualization
    
Dell Windows Server
Published By: IBM     Published Date: Apr 22, 2014
Consumers are leveraging innovative and richly functional mobile devices to become connected and empowered like never before, reshaping the consumer/marketer relationship and raising the stakes for marketers to utilize the mobile channel to engage shoppers and drive revenue.
Tags : 
ibm, mobile marketing, mobile, enterprise marketing management, management, consumers, customers, innovative marketing, cross-channel experience, mobile users, mobile consumers, retailers, marketers, higher mobile use, digital analytics, benchmark data, mobile-only, online retailers, mobile applications, mobile opportunities
    
IBM
Published By: IBM     Published Date: Aug 14, 2014
Consumers are leveraging innovative and richly functional mobile devices to become connected and empowered like never before, reshaping the consumer/marketer relationship and raising the stakes for marketers to utilize the mobile channel to engage shoppers and drive revenue.
Tags : 
ibm, mobile, marketing, consumer, marketer, mobile channel, revenue
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 12, 2017
Cloud saves money, cloud saves time, blah, blah, blah. But what do you need to know as a developer moving development and testing to the cloud – especially for Java apps? With a handful of test environments for each production environment you contribute to, you have to get this right to get any advantage. Join Anand Kothari, Senior Director of Product Management for Oracle Cloud Platform to discover how you can utilize the Cloud to take Java to the next level.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Skillsoft     Published Date: Nov 21, 2013
Learning is critical to enabling business strategy, from onboarding new hires to developing future leaders, to educating channel partners and customers. This study, based on responses collected from 185 organizations between July and September 2013, looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs. Research conducted by Aberdeen Group and brought to you thanks to Skillsoft.
Tags : 
career advancement, learning, training, certification, onboarding, employee development, human capital management, learning, employee performance
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
This study looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle, and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs.
Tags : 
business strategies, development programs, employee lifecycle, technology integration, performance management, employee performance, leadership bench strength
    
Skillsoft
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic
    
Cisco
Published By: AWS     Published Date: Mar 22, 2018
Healthcare and Life Sciences organizations are adopting cloud-based workloads at a significant pace. A 2017 HIMSS study found that 65% of Healthcare organizations were using cloud-based services, and nearly 88% of those organizations were utilizing Software-as-a-Service (SaaS) solutions, which have become the preferred deployment method for many clinical application vendors. This eBook highlights advantages of using AWS to create and maintain cloudbased Next-Gen BI Solutions for Healthcare and Life Sciences organizations. This includes use cases from diverse organizations that have utilized AWS and APN Partners to manage and analyze data, and to discover insights otherwise obscured by the sheer volume of available information. Solutions from APN Partners can help your organization take the next step in building robust processes for making data-driven decisions that improve patient care, organizational processes, and innovative product development efforts.
Tags : 
    
AWS
Published By: Datorama     Published Date: Aug 26, 2014
The extreme complexity of today’s marketing landscape, combined with the abundance of choices available to consumers, means marketers need to approach each marketing decision as intelligently as possible. Download this whitepaper to learn how marketers can utilize omni-channel analytics to garner strategic insights and guide them in the decision making process.
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Datorama
Published By: IBM     Published Date: Jul 22, 2014
Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
ibm, cloud, cloud storage, storage, storage environment efficiency, environment efficiency, data protection, data driven analytics, storage systems, storage costs, it budget
    
IBM
Published By: Intel     Published Date: Dec 13, 2018
Advanced image analysis and computer vision are key components of today’s AI revolution and is becoming critical for a wide range of industry applications, including healthcare, where this technology is being used to detect anomalies and improve patient care. Due to a lack of integrated tools and experience with these cutting-edge technologies, however, deploying complete systems is difficult. Applications that utilize deep learning approaches often require large amounts of highly parallel compute power, storage, and networking capabilities, along with performance optimizations for faster data analysis. The Intel and QNAP/IEI solution combines all these elements in one complete system for scalable data management for hospitals and clinics of all sizes. Read more on Intel’s and QNAP/IEI’s real-world use case on macular degeneration analysis through high-performance computing, vision capabilities, storage, and networking in a single solution.
Tags : 
    
Intel
Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail, cost control, ibm
    
IBM
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat Optimized Video Delivery utilizes a combination of stream-splitting and caching technologies to prevent "video floods" that are caused when Internet video saturates a company's WAN or Internet gateway and keeps other applications from performing properly.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Trifacta     Published Date: Oct 25, 2018
The rise of the self-service analytics era has called for a more flexible, iterative approach to data preparation. But as you and your team look to invest in modern data preparation solutions, understanding how to best evaluate these technologies can be difficult. In Ovum’s first Decision Matrix report on self-service data preparation, analyst Paige Bartley takes a comprehensive look at the eight major data preparation vendors by assessing each company’s technology and execution. Download this report to learn: Which vendors Ovum ranks as leaders in self-service data prep The strengths, weaknesses, opportunities and threats of all 8 data prep vendors A detailed overview of the criteria Ovum utilized in their evaluation
Tags : 
    
Trifacta
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: 3D Systems     Published Date: May 15, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
    
3D Systems
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Splunk     Published Date: Nov 29, 2018
From protecting customer experience to preserving lines of revenue, IT operations teams face increasingly complex responsibilities and are responsible for preventing outages that could harm the organization. As a Splunk customer, your machine data platform empowers you to utilize machine learning to reduce MTTR. Discover how six companies utilize machine learning and AI to predict outages, protect business revenue and deliver exceptional customer experiences. Download the e-book to learn how: Micron Technology reduced number of IT incidents by more than 50% Econocom provides better customer service by centralizing once-siloed analytics, improving SLA performance and significantly reducing the number of events TransUnion combines machine data from multiple applications to create an end-to-end transaction flow
Tags : 
predictive it, predictive it tools, predictive analytics for it, big data and predictive analytics
    
Splunk
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.