Skip to main content
 

shared

Results 1 - 25 of 257Sort Results By: Published Date | Title | Company Name
Published By: Caradigm     Published Date: Feb 16, 2015
Many organizations joined the ACO program with the idea of using it as the first step in the transition to new reimbursement models. It’s a critical time for more ACOs to achieve the milestone of shared savings in order to demonstrate the ability to lower costs for an “at-risk” population. As best practices are emerging from early participants in the ACO program, ACOs have the opportunity to evolve their strategies in order to achieve more success.
Tags : 
    
Caradigm
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache
    
BitGravity
Published By: SafeStart     Published Date: Mar 02, 2018
The 2nd Annual Safety Progress Survey from SafeStart and the EHS Daily Advisor was launched in November 2017, and by the time the survey closed, 531 environmental, health, and safety (EHS) professionals had shared their insights into the state of safety at their companies. Our 2018 Safety Progress Report includes all of the findings from the new survey, as well as year-over-year comparisons. You’ll see how EHS pros and their organizations are moving the safety needle in a positive direction, eliminating challenges, and checking off the required boxes necessary to meet the very important objective of protecting workers in all industries. Download the report to see what our respondents had to say!
Tags : 
    
SafeStart
Published By: Microsoft Office 365     Published Date: Nov 03, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate clearly, information is shared easily, and processes are streamlined. When improving collaboration in your enterprise, here are five core areas to focus on: Saving time and increasing productivity Lowering costs and complexity Ensuring end-to-end security compliance Scaling at your own pace Having administrative control In this free eBook, learn how a single-vendor platform helps you achieve these goals.
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : 
technology, best practices, poweredge, hyper converged, networking, mobile computing
    
Dell
Published By: Dell     Published Date: Jul 08, 2016
In a Hyper-Converged Infrastructure, compute, networking, and shared storage are delivered from Dell 13G PowerEdge servers powered by Intel Xeon processors, which enables a pay-as-you-go, aff?ordable model to cost-effectively operate at high performance.
Tags : 
best practices, technology, data, infrastructure, networking, poweredge, storage
    
Dell
Published By: Adobe     Published Date: Apr 23, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
2017 Trends in Financial Services and Insurance: Customer is Priority The FSI sector is progressing with a digital, data-driven, marketing mentality, all centered around prioritizing customer experience and taking a more personal approach. The 2017 Digital Trends in Financial Services and Insurance compiles the information shared by over 800 FSI respondents to see what opportunities and obstacles are shaping the future of FSI. Read this report and find out: How data and personalization drive digital transformation How fintech is leading the FSI chase Tips to help future-proof your FSI business
Tags : 
    
Adobe
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Delphix     Published Date: May 03, 2016
Today's test data management (TDM) solutions force teams to work with compromised data sets, and push testing to too late in the software development lifecycle. The end result is rework, delayed releases, and costly bugs that cripple production systems. Furthermore, prevailing approaches to test data management - including subsetting, synthetic data, shared environments, and standalone masking--represent flawed solutions that fail across one or more key dimensions.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 02, 2015
To help users achieve these goals and attain greater simplicity, efficiency and versatility in ROBO sites, Dell engineered the PowerEdge VRTX shared infrastructure platform. Download this white paper to learn more about Dell PowerEdge VRTX.
Tags : 
    
Dell EMC
Published By: Dell     Published Date: Oct 24, 2014
This start-up guide provides instructions on how to configure the Dell™ PowerEdge™ VRTX chassis with Microsoft® Windows Server® 2012 in a supported failover cluster environment. These instructions cover configuration and installation information for chassis-shared storage and networking, failover clustering, Hyper-V, Cluster Shared Volumes (CSV), and specialized requirements for Windows Server 2012 to function correctly with the VRTX chassis.
Tags : 
server configuration, role configuration, virtual disks, server installation
    
Dell
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
A start up guide to Paul Marquardt Building Microsoft Windows Server 2012 Clusters on the Dell PowerEdge VRTX.
Tags : 
dell, vrtx, paul marquardt, microsoft windows server, windows server®, cluster shared volumes, csv
    
Dell Brought to you by Intel
Published By: SAS     Published Date: Nov 04, 2015
In a panel discussion at the 12th annual SAS Health Analytics Executive Forum in May 2015, leaders from Dignity Health, Horizon Blue Cross Blue Shield of New Jersey, Janssen Pharmaceuticals and SAS shared what they have done to prove the value of analytics to their business leaders – and what has worked for them as they developed an analytic culture in their organizations and put analytic insights to work.
Tags : 
sas, healthcare, healthcare models, episode analytics, analytics, information technology, practice management
    
SAS
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: NetApp     Published Date: Dec 05, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions in a Software as a Service (SaaS) model to more than 2,800 customers with employees in 150 countries. “Storage has always been Ultimate’s biggest technology challenge" according to Senior Director of Cloud Operations, Steven May. The company’s storage goals revolve around managing growth while combining the economics of leveraging shared resources on demand with the performance and predictability of dedicated infrastructure. Seeking high IOPS performance, fault tolerance, and scalability, along with a high availability solution that supports both VMware and OpenStack, Ultimate's search led them to SolidFire.
Tags : 
    
NetApp
Published By: GE Healthcare     Published Date: Aug 27, 2015
Healthcare organizations are facing uncertain times, which are putting enormous strains on their revenue cycle management (RCM). Automation is proven to improve RCM measures, and even small improvements can significantly impact the bottom line. This whitepaper details how providers can embrace automation to help drive financial performance.
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
    
GE Healthcare
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.