Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

infor

Results 1 - 25 of 3899Sort Results By: Published Date | Title | Company Name
Published By: Cognizant     Published Date: Oct 23, 2018
Value-based care is the predominant model for enabling the healthcare industry to control costs and deliver better information to consumers. The basic idea is that reimbursements are based on the quality of the outcome of a procedure, episode of care, use of a device or therapy. Under this model, life sciences companies are rewarded for improving health outcomes and/or reducing the costs to achieve those outcomes. It requires life sciences companies to rethink many of their processes, from R&D through the commercial phase. Navigating those momentous shifts requires that life sciences companies embrace a range of digital technologies which will enable a holistic approach to value-based care. This white paper will examine the drive for value-based care, its impact on life sciences companies and how technology platforms can address the challenges the industry is facing.
Tags : 
    
Cognizant
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: UL     Published Date: Oct 22, 2018
CERTIFICATION IMPACT ANALYSIS: IEC 62368-1, EDITION No. 3 Audio/Video, Information and Communication Technology Equipment – Part 1: Safety Requirements.
Tags : 
audio, video, communication, technology, safety requirements
    
UL
Published By: Fujitsu EMEA     Published Date: Oct 22, 2018
The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. To find our more download this ebook today.
Tags : 
    
Fujitsu EMEA
Published By: CyberSource     Published Date: Oct 19, 2018
Did you know that hackers aren’t just interested in large enterprise businesses? Or that you can operate your business without raw payment data? Learn the truth about the five most common payment security myths today in this informative e-book.
Tags : 
    
CyberSource
Published By: Epicor     Published Date: Oct 17, 2018
As technology improves, retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. By reading this Epicor eBook, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read the eBook and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure
Published By: Amazon Web Services     Published Date: Oct 12, 2018
Safeguarding your data is more important than ever. In today’s data-driven business landscape, companies are using their data to innovate, inform product improvements, and personalize services for their customers. The sheer volume of data collected for these purposes keeps growing, but the solutions available to organizations for processing and analyzing it become more efficient and intuitive every day. Reaching the right customers at the right time with the right offers has never been easier. With this newfound agility, however, comes new opportunities for vulnerability. With so much riding on the integrity of your data and the services that make it secure and available, it’s crucial to have a plan in place for unexpected events that can wipe out your physical IT environment or otherwise compromise data access. The potential for natural disasters, malicious software attacks, and other unforeseen events necessitates that companies implement a robust disaster recovery (DR) strategy to
Tags : 
    
Amazon Web Services
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Pure Storage     Published Date: Oct 09, 2018
Alors que le stockage flash se généralise dans le monde de l'informatique, les entreprises commencent à mieux comprendre non seulement ses atouts en termes de performances, mais également les avantages économiques secondaires de son déploiement à grande échelle. La combinaison des avantages des baies 100 % flash - latence réduite, débit plus élevé et bande passante plus large, densités de stockage plus élevées, consommation énergétique et encombrement considérablement réduits, meilleure exploitation des UC, réduction du nombre de serveurs nécessaires et, en conséquence, coûts de licences amoindris et fiabilité matérielle accrue – en a fait une option économiquement attrayante comparée aux architectures de stockage d'ancienne génération, mises au point à l’origine pour les disques durs (HDD). Alors que les baies flash hybrides (HFA) se développent à un rythme exponentiel et que le taux d’utilisation de baies 100 % HDD chute vertigineusement, les AFA enregistrent une progression parmi le
Tags : 
    
Pure Storage
Published By: Excellus BlueCross BlueShield     Published Date: Oct 09, 2018
When it comes to protecting yourself against breast cancer, knowledge is power. This handout stresses the importance of early detection, highlighting the warning signs to look for and steps your employees can take to keep themselves healthy.
Tags : 
healthcare, health benefits, health insurance, breast cancer, excellus, mammograms
    
Excellus BlueCross BlueShield
Published By: Workday DACH     Published Date: Oct 08, 2018
Betrachten wir den Buchstaben „I“ in CIO – „I“ für „Informationen“. Informationen bestimmen alles, was wir tun. Ohne Informationen werden keine Entscheidungen getroffen und ein zielgerichtetes Handeln ist kaum möglich. Die Informationsschnittstelle in einem Unternehmen ist der CIO. Er entwickelt und managt das Konzept, wie Informationen gesammelt, organisiert, gespeichert, verarbeitet und analysiert werden. Da Informationen immer mehr zur Währung der globalen Wirtschaft werden, verändert sich die Rolle des CIO: aufgrund seiner einzigartigen Fähigkeit, Informationen zu verstehen und zu verwalten, gewinnt seine Rolle an strategischer Bedeutung.
Tags : 
    
Workday DACH
Published By: Zerto     Published Date: Oct 08, 2018
"Gartner’s SWOT on Zerto examines Zerto’s position as a top provider for enterprise disaster recovery and IT Resilience. This informative, enlightening report from Gartner, the world’s preeminent research and advisory firm, will help business leaders like you make informed decisions about using Zerto solutions to achieve IT resilience. The Gartner SWOT on Zerto covers: In-depth 3rd party Analysis Recommendations on Zerto Use Cases Beyond Disaster Recovery Implications for Your Business Download the Gartner SWOT analysis to help guide you as you navigate the next steps for your organizations path to IT resilience!"
Tags : 
gartner, resilence decision-making, hybrid cloud
    
Zerto
Published By: Zerto     Published Date: Oct 08, 2018
"Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 eBook will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure. This 101 guide will educate you on topics like: How to evaluate replication technologies Measuring the cost of downtime How to test your Disaster Recovery plan Reasons why backup isn’t Disaster Recovery Tips for leveraging the cloud Mitigating IT threats like ransomware Get your business prepared for any interruption, download the Disaster Recovery 101 eBook now!"
Tags : 
disaster recovery, dr strategy, ransomware
    
Zerto
Published By: Uberall     Published Date: Oct 08, 2018
One of the great advantages of the digital age is the vast amount of information and opinions that consumers are exposed to when making a buying decision. This gives enormous exposure to businesses, whether in a positive or negative way. With this significant increase in information, unbiased and authentic customer reviews become increasingly important to both consumers and businesses. There is a wide choice of rating portals and review platforms, that specialize in all types of industries and services.
Tags : 
consumer, digital, information, portals, services, local marketing, consumer sentiment, reputation management
    
Uberall
Published By: T Systems     Published Date: Oct 05, 2018
Fortunately, the wait is over. Here at T-Systems, we have created a whitepaper that contains Gartner’s 2018 Strategic Roadmap for Networking report which provides you with a wealth of information and guidance. Not only does it offer impartial advice from a technological perspective but it also interweaves the equally important, but often neglected viewpoints from a skills, processes and cultural stance. We feel confident that you’ll agree that armed with this whitepaper and Gartner’s report which successfully combine highly relevant insights with precision accuracy - you will be able to lay a solid foundation for your own networking pathway. Being able to correctly identify where your current networking solutions are presently and compare these with what you need to develop these into; to realize your goal - is one area of many, where we feel Gartner’s report excels. So whether it is their gap analysis, identification of key trends, signposting of the pitfalls that even the most con
Tags : 
    
T Systems
Published By: Herman Miller     Published Date: Oct 04, 2018
As workplace researcher Robert Propst observed in A Facility Based on Change, “Not only must we accept change, we must adjust to accelerated growth.” If your office doesn’t reflect who you are now and who you hope to become in the future, accelerated growth can feel especially painful. Whoever you are, you can’t escape change. But we think that workplaces can actually be catalysts for growth without all the growing pains. Whether you’re trying to spark innovative thinking or encourage people to work together more efficiently, you can reach your goals with a workplace tailored to your unique needs. We’ve been capturing workplace data and transforming it into growth-enhancing insight since Propst began studying the connections between people, work, and the workplace nearly 50 years ago. This legacy of workplace research—in combination with the research we do today—informs Living Office®, a research-based placemaking approach that ignites powerful workplace transformations. With Living Of
Tags : 
    
Herman Miller
Published By: Qualtrics     Published Date: Oct 04, 2018
Advertising is a high-risk game. Done well, ads break through the noise, spark conversations about your brand, drive demand, and boost sales. Done poorly, ads bury your messages, damage your brand image, fail to generate revenue, and waste budget on expensive campaigns that fail to deliver. With so much on the line, getting your ads right is crucial. How do you ensure success? Ad testing. As the name implies, ad testing is validating your ad with your target audience prior to launch. You can test individual portions of your ad, like messaging, headlines, visuals or calls to action, or even initial reactions to early ad concepts. Ad testing gives you the following benefits: • Predict the effect on purchase intent • Make informed go or no-go decisions on a specific ad launch • Understand how your brand is perceived • Get the highest ROI from your ad spend Ad testing is one of the best ways to protect your advertising budget and maximize the chances of landing the right messaging with you
Tags : 
    
Qualtrics
Published By: SAS     Published Date: Oct 03, 2018
Because terrorists and other criminals are already using technology to carry out their missions, intelligence professionals need to access all available, appropriate information, to extract important elements and process, analyze and disseminate it quickly to keep ahead of potential threats. The scale, complexity and changing nature of intelligence data can make it impossible to stay in front without the aid of technology to collect, process and analyze big data. This paper describes a solution for how this information can be quickly and safely shared with access based on a user's organizational responsibilities and need to know.
Tags : 
    
SAS
Published By: Mimecast     Published Date: Oct 02, 2018
Informationen zur aktuellen Bedrohungslage, zu fehleranfälligen Schutzmechanismen und zu menschlichem Versagen –und wie eine Cyber Resilience Strategie Sie vor Cyber Angriffen schützt.
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.