RSS feed Get our RSS feed

News by Topic

merge

Results 126 - 150 of 429Sort Results By: Published Date | Title | Company Name
By: Aon Hewitt     Published Date: Oct 13, 2014
Are you struggling to predict and manage the rising cost of health care at your organization, while still trying to offer your employees and their families quality, affordable health coverage? Private health exchanges have emerged as a strategy employers are using to help curb this cost trend while offering employees more choice and control over their health care. Download XChanges Today to learn about this changing marketplace and how private exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees, and providers.
Tags : aon, health coverage, private health exchanges, insurance, xchanges, affordable health coverage
     Aon Hewitt
By: Oracle     Published Date: Apr 29, 2014
Many enterprises contend with fragmented systems and processes. Mergers and acquisitions have increased the number of organizations with disparate systems and business units. Download this white paper to learn how to achieve and integrated accounting platform.
Tags : oracle, accounting platform, mergers and acquisitions, disparate systems, fragmented accounting
     Oracle
By: OpenDNS     Published Date: Mar 31, 2015
A security strategy centered on preventing identified attacks and threats no longer provides adequate protection. New malware tactics emerge at a rate impossible for security professionals to match. Learn how to become a less appealing target and reduce the potential impact of security breaches.
Tags : 
     OpenDNS
By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : forrester, wave, web, application, firewalls, akamai
     Akamai Technologies
By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selectica’s roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selectica’s case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
     Determine (Selectica)
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, security, risk reduction, containerization, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, risk reduction, data security, collaboration, containerization
     Citrix ShareFile
By: Carbonite     Published Date: Oct 10, 2018
In the last few years, businesses have changed the way they protect data. Studies show they’re abandoning traditional backup and recovery in favor of disaster recovery as a service (DRaaS).1 With DRaaS, businesses enjoy the luxury of keeping a replica of their data hosted at a remote site that they can fail over to in an emergency—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the provider. Gartner predicts that global DRaaS revenue will reach $3.4 billion by 2019. The firm cited several reasons for the shift:
Tags : 
     Carbonite
By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
     Applause Israel
By: Applause Israel     Published Date: Sep 25, 2018
In the midst of an overwhelming amount of disruption taking place in the retail banking industry, a clear path to success has emerged. Banks that want to continue to gain and retain loyal customers must make it easier to bank with them. According to a survey that included 760 different banks and credit unions, the most important priority for 2017 and beyond is the removal of friction from the customer journey.1 To clarify, today’s customer journey includes both the customer experience at local branch locations as well as their experience while interacting with websites, mobile apps, smart watches, and anything else that is connected to the Internet. The battleground for customers has shifted to the digital world, and retail banks must adapt quickly as crafty Fintech startups and tech giants like Amazon, Apple, and Google continue to push the limits of what is possible with technology. If digital channels aren’t approached correctly, they can add complexity to the customer experience in
Tags : 
     Applause Israel
By: Loop Commerce     Published Date: Mar 08, 2019
Fung Global Retail & Technology had the opportunity to interview Roy Erez, Co-Founder and CEO of Loop Commerce. Loop’s gifting solution is already used by many large retailers including Neiman Marcus, Saks Fifth Avenue, and Coach. Erez shared his insights about the gifting category and the emergence of what Loop defines as “G-Commerce” (gift commerce). Loop Commerce is changing the landscape of the online gift-buying and receiving experience, creating new opportunities and leading the way to a $600B gifting market.
Tags : 
     Loop Commerce
By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security
     Illusive Networks
By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
     Amazon Web Services
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : mapping, public saftey, location data
     HERE Technologies
By: Hayes, Inc.     Published Date: Aug 16, 2016
What is the role of evidence-based medicine in population health management? With the emergence of value-based reimbursement, more and more health systems have a renewed focus on population health management. See how evidence-based medicine becomes the "sheet music" to an effective population health program.
Tags : hospitals, health systems, technology acquisition, standardization, healthcare
     Hayes, Inc.
By: LiveRamp     Published Date: Jan 02, 2018
Mais restez connectés : on compte bien le mettre à jour dès que quelque chose de nouveau et sympa émergera dans le monde du marketing piloté par les données. En attendant, pourquoi ne pas vous initier en cinq minutes au data onboardin g et connecter vos données online et offline?
Tags : adressabilitie, serveur publicitaire, place de marche, analyse, api, supression des annonces
     LiveRamp
By: Drillinginfo     Published Date: Nov 18, 2015
The Permian basin, a long time oil and gas producing region nestled in west Texas and southeastern New Mexico was once believe to have reached “Peak Oil” extraction levels. A significantly larger play than the booming Eagle Ford Shale, the Permian Basin has reemerged as a production pillar for the US, thanks to advancements in horizontal drilling and hydraulic fracturing. Although still in early stages of new production, the Permian has already transformed the local economies surrounding the play, adding to the energy security of the U.S. In this issue of the DI Expert eBook, by Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions, our expert analysts have delved into the complexities of the geology in the Permian, highlighted the successes of operators in the region and provided in-depth analyses on the play’s re-emergence.
Tags : basin, permian, peak oil, extraction, energy security, geologists, downspacing, innovations
     Drillinginfo
By: IBM     Published Date: Aug 08, 2016
Hybrid cloud has emerged as the cornerstone for digital transformation, enabling developers to create unique and compelling mobile, IoT, and web applications while extending their IT investments and capabilities. Attend this webinar to learn how you can leverage your WebSphere Application Server infrastructure and investments to maximize performance, lower costs, and successfully move forward into a hybrid cloud world.
Tags : ibm, cloud, hybrid cloud, middleware, application infrastructure, websphere application server, cloud
     IBM
By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
     Entrust Datacard
By: Red Hat     Published Date: Sep 25, 2014
Today’s mega IT trends – cloud computing, big data, mobile and social media –have dramatically altered how enterprises work, requiring datacenters to find new, more flexible and cost effective ways to meet computing demands. For most datacenters, the path toward tomorrow's compute paradigm mandates an investment in standardization and consolidation as well as a more robust adoption of enterprise virtualization software, along with cloud system software to extend that virtualized infrastructure into a true private cloud environment. Linux has emerged as one of the key elements to a modernization program for a datacenter.
Tags : datacenter, modernization, enterprise virtualization, infrastructure, private cloud enviornment
     Red Hat
By: Dun & Bradstreet     Published Date: Oct 30, 2015
Finance can emerge from cost center to growth driver.
Tags : hoover, finance, operations, sales, growth
     Dun & Bradstreet
By: DrFirst     Published Date: Mar 13, 2015
Sebasticook Valley Health’s Emergency Department found that when it came to obtaining medication history, DrFirst’s MedHx(SM) solution provided vast improvements over the built-in feed from their integrated electronic medical records system. The hospital did a side by side comparison of MedHx(SM) and their existing feed, and determined that MedHx(SM) provided superior results, which reduced staff time spent on medication reconciliation, improved patient safety and enabled the hospital pharmacy, as well as doctors and nurses, to be more proactive in pulling medication history upon patient admission.
Tags : drfirst, hospital, solutions, medhx, emr, electronic, medical, records
     DrFirst
By: athenahealth     Published Date: Jun 08, 2015
We convened top academic medical center leaders for our AMC Advisory Roundtable in October of 2013. We also conduct regular discussions with a wide array of health care executives, including leaders of health systems, medical groups, insurance companies, and academic institutions. This whitepaper shares some of the key themes that have emerged from those meetings.
Tags : academic medical center, clinical activities, research activities, education
     athenahealth
By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : technology, enterprise applications, best practices, business optimization, technology architecture
     MuleSoft
By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : service management, enterprise applications, best practices, business management, business strategy
     MuleSoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics