Skip to main content
 

traditional

Results 1 - 25 of 1476Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Feb 12, 2015
The path to integration includes traditional M&As and a growing number of unique partnerships
Tags : 
    
HealthLeaders Media
Published By: Parallon     Published Date: Sep 16, 2015
A recent HealthLeaders Media Intelligence survey asked respondents to rank their top challenges impacting financial performance and to identify specific areas of concern within each of those issues. Their top three issues were system implementation and interoperability, recruiting and retaining talent, and reengineering the revenue cycle. On the surface, it’s tempting to think these findings aren’t surprising. Yet emerging external factors, including the cumulative effects of the HITECH Act (meaningful use), the Affordable Care Act, and an aging U.S. population, are creating new frameworks in which to view and solve these traditional problems.
Tags : 
    
Parallon
Published By: Parallon     Published Date: Dec 18, 2015
Download the free, on-demand version of this webcast that took place on December 16, 2015. Change is commonplace within the healthcare industry. Executives are faced with many of the traditional challenges of operating hospitals. Now emerging external factors like the HITECH Act (meaningful use), the Affordable Care Act and an aging U.S. population are pushing providers to change the frameworks in how they view and solve these traditional problems.
Tags : 
    
Parallon
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
"Learn how to manage a software defined infrastructure SDI deployment and understand the benefit of composable versus traditional infrastructure. The white paper will also cover the definition of an SDI as well as what an IT organization should look for in an SDI solutions provider. Explore these questions in this white paper with a critical look at HPE’s software-defined and CI offering, HPE Synergy."
Tags : 
    
Hewlett Packard Enterprise
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses aren’t enough anymore. In today’s rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Here’s a total email-protection strategy that can help radically reduce an organization’s susceptibility to attacks.
Tags : 
    
Barracuda
Published By: KPMG     Published Date: Jun 10, 2019
A supplier partnership model delivers greater levels of innovation than traditional transaction methods. Here’s how to get started. Read this insight to discover: • key steps for building strong supplier relationships • potential risk areas that must be managed • why behaviour change is as important as processes and tools • why aligning your own organisation is essential.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We liked that Umbrella’s intelligent proxy would give us granular protection without the performance impact of a traditional web proxy.” - Torben Olsen, Corporate Information Security Manager, Lundbeck
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: PwC     Published Date: Sep 18, 2019
The traditional payer business model is fast becoming obsolete. Blues organizations that cling to the status quo or business as usual risk jeopardizing their reputations and business, because people are more than patients. Increasingly, employers are driving the growing demand for more solutions to engage customers. In response, healthcare incumbents and new entrants are building solutions to address rising costs and meet consumers’ demands for personalization, price transparency, access, and seamless, simple experiences. Proactive engagement can help your members lead healthier lives while improving outcomes for payers and other players. With 5% of Americans consuming 50% of healthcare costs, identifying and engaging high-risk, high-cost customer segments is essential to sustainability.
Tags : 
    
PwC
Published By: Workday APAC     Published Date: Oct 07, 2019
"Following a study of hundreds of organisations about how they scale agile, this Harvard Business Review article outlines what they’ve learned, and how to scale agile effectively. They studied small firms that run their entire business with agile methods, already agile larger companies that are becoming even more agile as they’ve grown, and organisations that are making the transition from traditional hierarchies to more agile enterprises. Download the article to discover how these organisations have scaled agile effectively. "
Tags : 
    
Workday APAC
Published By: Intel     Published Date: Sep 27, 2019
As data constantly changes and expands, data centers increasingly face capacity, performance, and cost limitations related to existing memory and storage solutions. Intel Optane data center (DC) technology addresses these challenges by placing data closer to the CPU and closing the gap between traditional memory and storage options, thus transforming the memory and storage tier.
Tags : 
    
Intel
Published By: Trend Micro     Published Date: Aug 07, 2019
As the threat landscape evolves, organizations have accepted the fact that they have to take a more proactive detection approach to advanced threats rather than relying on traditional defenses. As a result, customers have turned to detection and response tools that allow for proactive “hunting” for Indicators of Attack (IoA) and reactive “sweeping” for indicators of compromise (IoCs). Once found, those tools are required to automatically respond to attacks or to at least provide for an action from the Incident Response (IR) staff. Unfortunately, due to the number and complexity of both these attacks and the detection/response tools, organizations struggle to hire enough qualified staff and stay on top of the discovered threats. This is compounded by a worldwide cybersecurity skills shortage. Managed detection and response (XDR) provides advanced threat hunting, detection, and response as a service to organizations that seek assistance for their own IR staff, or for those who wish to o
Tags : 
    
Trend Micro
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: KPMG     Published Date: Jun 06, 2019
Discover how the CMO is evolving from brand guru into customer advocate. With key actions for creating a truly customer-centric marketing organisation. Read this report to discover: • how and why the marketing organisation must transform • why CMOs must expand their knowledge and responsibilities beyond traditional marketing • how to measure success in a customer-centric environment • seven key actions for creating a customer-centric marketing organisation.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Traditional strategies for driving sales are no longer enough. Brands that only connect with customers on a transactional basis are losing out to more innovative brands that create a richer experience for customers. Read this story to find out: • how we developed a digital strategy to restore growth to an iconic sporting brand • how data can drive a dynamic connection with customers and create new opportunities for growth • key principles for developing your own digital strategy.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Cities need to rethink public transport systems to meet consumer demand for flexible, on-demand services. By doing this, they can also unclog congested roads, improve safety and reduce carbon emissions. Read this insight to discover: • how patterns of mobility are changing in major cities • what customers want – and the key challenges to meeting their expectations • whether microtransit solutions can be an effective complement to traditional public services • three key levers to pull to develop responsive, demand-driven services.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
A global mobility revolution has already begun and is accelerating rapidly, opening up major opportunities and challenges for players across the mobility ecosystem. Read this report to discover: • the likely winners and losers in the mobility revolution • how the way people and goods are moved will change dramatically • how the mobility revolution will impact eight traditional sectors • what alliances organisations must build to win in this brave new world.
Tags : 
    
KPMG
Published By: Workday     Published Date: Jul 30, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs—one using on-premise software and one using Workday.
Tags : 
    
Workday
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Zilliant     Published Date: Oct 11, 2019
The maintenance, repair and overhaul (MRO) and industrial distribution industry is massive and continues to grow at a steady pace. Despite this positive outlook, individual MRO distributors aren’t short on their own challenges when it comes to retaining and growing their market share. There are several factors hindering MRO companies from retaining the share they have and claiming more. Namely: • Complexity: Their large customer counts and behemoth SKU counts render it impossible to give reps market-aligned pricing guidance and sales intelligence • Competition: MRO is ripe for poaching by Amazon, and as a result, traditional distributors continue to see market share slipping away to the online giant • Skills: A massive generational shift in the workforce is resulting in a skills gap that’s proving particularly problematic to fill In this playbook for MRO and industrial products distributors, we will discuss how growth is hindered in this dynamic industry and then provide reimagin
Tags : 
    
Zilliant
Published By: BetterUp     Published Date: Mar 06, 2019
Research suggests that up to half of the investment your organization is making in Learning & Development (L&D) is being wasted. Employees unfortunately lose up to 75% of the information they receive through traditional L&D approaches (including learning management systems, episodic trainings, and workshops) — an effect known as the training transfer problem. In this report, discover the five critical requirements for effective behavior change and leadership development.
Tags : 
    
BetterUp
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Tags : 
    
Amazon Web Services APAC
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa
    
NEC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.