Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

coo

Results 126 - 150 of 494Sort Results By: Published Date | Title | Company Name
Published By: Service Now     Published Date: Feb 15, 2017
This report explores how HR can be unleashed from time-consuming, manual activities, such as answering benefit enquiries or coordinating employee onboarding tasks. It looks at how those two days a week spent on administrative tasks can be applied to innovative ideas and employee-led initiatives, with real-world examples of HR transformation in practice.
Tags : 
hr transformation, servicenow, service management
    
Service Now
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: Schneider Electric     Published Date: Nov 17, 2016
Today’s data center power and cooling infrastructure has roughly 3 times more data points / notifications than it did 10 years ago. Traditional data center remote monitoring services have been available for over 10 years but were not designed to support this amount of data monitoring and the associated alarms, let alone extract value from the data. This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
schneider electric, digital remote monitoring, data center operations, maintenance, enterprise applications, infrastructure
    
Schneider Electric
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Published By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Published By: Genesys     Published Date: Jun 11, 2013
Delivering exceptional multichannel customer service takes a coordinated effort across four dimensions — strategy, process, technology and people management.
Tags : 
value-added, customer service, media, voice, strategy, multichannel, people management, process
    
Genesys
Published By: RelayHealth     Published Date: Mar 29, 2013
Atlantic Health System, based in New Jersey, led an initiative to connect healthcare providers with one another and with patients to improve care coordination and patient engagement.
Tags : 
care coordination, patient engagement, relayhealth, atlantic health system, hio, financial connectivity, claims processing, account resolution
    
RelayHealth
Published By: RelayHealth     Published Date: Mar 29, 2013
Widespread electronic health record (EHR) adoption has ushered in a pivotal moment in laying the groundwork for health information exchange (HIE).
Tags : 
meaningful use, hie, health information exchange, ehr, electronic health records, connectivity, care coordination, population health
    
RelayHealth
Published By: RelayHealth     Published Date: Mar 29, 2013
Connecting clinical and pharmacy networks so community pharmacies can contribute to improved patient care and participate in new care delivery models.
Tags : 
clinincal integration, pharmacy integration, longitudinal patient record, medication adherence, care coordination, patient engagement
    
RelayHealth
Published By: Red Hat     Published Date: Mar 11, 2016
The cool vendors in this research are very diverse in their technical paradigms. This confirms that the DevOps "virtual" market is still very much in motion/forming and adds to the confusion of potential buyers.
Tags : 
    
Red Hat
Published By: NetApp     Published Date: Sep 11, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash technologies, total cost of ownership, flash storage, data center, increased flexibility
    
NetApp
Published By: Care360 by Quest Diagnostics     Published Date: Sep 03, 2015
More than 300,000 providers use the Care360 platform to manage patient data, connect with their community network and improve care coordination.
Tags : 
care 360, discover care 360, patient data, rcm, ehr, patient outcomes, eprescribing
    
Care360 by Quest Diagnostics
Published By: DrFirst     Published Date: Mar 13, 2015
Sebasticook Valley Health’s Emergency Department found that when it came to obtaining medication history, DrFirst’s MedHx(SM) solution provided vast improvements over the built-in feed from their integrated electronic medical records system. The hospital did a side by side comparison of MedHx(SM) and their existing feed, and determined that MedHx(SM) provided superior results, which reduced staff time spent on medication reconciliation, improved patient safety and enabled the hospital pharmacy, as well as doctors and nurses, to be more proactive in pulling medication history upon patient admission.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical, records
    
DrFirst
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: IBM Watson Health     Published Date: Jun 14, 2017
Learn how IBM Watson Health clinical application advisors helped Floyd Health Care System take full advantage of the platform’s many benefits. Business Challenge As part of its journey toward population health management, Floyd wanted to optimize the way it used the IBM® Phytel® solution from IBM Watson Health™ and take advantage of its analytical tools. Transformation With help from an IBM Watson Health clinical application advisor, Floyd expanded its IBM solutions and used their unique capabilities to progress toward a more robust population healthcare model by adding care coordination activities and improving key process measures.
Tags : 
floyd health care system, ibm, ibm watson health, analytics, healthcare
    
IBM Watson Health
Published By: IBM     Published Date: Mar 20, 2017
"In the world of OTT 2.0, cross-device personalization is critical. (Not to mention really cool.) Deliver the experience your viewers expect with the confidence your business requires. Download this brochure from IBM Cloud Video's OTT Success Series to learn: -The new imperatives for multi-stream, multi-device orchestration -Why live video now demands seamless cross-device interplay -The importance of server-side APIs in allowing for rapid iterations and device extensions"
Tags : 
ott, cross-device personlization, api, device extensions, multi-channel, customer experience
    
IBM
Published By: IBM     Published Date: Apr 10, 2017
"In the world of OTT 2.0, cross-device personalization is critical. (Not to mention really cool.) Deliver the experience your viewers expect with the confidence your business requires. Download this brochure from IBM Cloud Video's OTT Success Series to learn: -The new imperatives for multi-stream, multi-device orchestration -Why live video now demands seamless cross-device interplay -The importance of server-side APIs in allowing for rapid iterations and device extensions"
Tags : 
ibm cloud video, cross-device personalization, live video, api, device extensions
    
IBM
Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM
Published By: FinancialForce     Published Date: Aug 20, 2019
Are you prepared for the new Revenue Recognition standards? For most organizations, implementing the new standards will be a complex project that demands significant planning and coordination. The CFO Guide to Rev Rec outlines challenges and solutions as you transition your organization to the new standards, and how a cloud application can help position your company for a smooth, successful changeover.
Tags : 
    
FinancialForce
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: IBM     Published Date: Aug 09, 2018
IBM commissioned Forrester to conduct a TEI study examining potential ROI enterprises may realize by deploying Netcool Operations Insight.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.