ca wa

Results 1 - 25 of 7520Sort Results By: Published Date | Title | Company Name
Published By: Kindred Hospital Rehabilitation Services     Published Date: Aug 26, 2019
Research has demonstrated enhanced technology can improve communication between patients, families and care providers, improve motivation, and has the potential to effect better outcomes and higher levels of patient satisfaction. Additionally, better technology also makes the workplace more appealing to employees. With the investment and complexity involved, how can health systems utilize technology in the most efficient and effective ways to drive business results?
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: SendBird     Published Date: Nov 14, 2019
Why buyer-to-seller chat for marketplaces? Experts understand marketplace apps as a challenge in scaling both supply- and demand-side at the same time. Once trust and sufficient liquidity are achieved, the value of marketplaces shift to fostering transparent and efficient transactions. There’s no better way to connect buyer and seller than in-app messaging. Real-time messaging connects your marketplace’s buyers and sellers across multiple apps and platforms so they can engage and inform both supply and demand to transact more quickly. This creates more efficient transactions for the marketplace platform. Jeff Jordan, former eBay and current General Partner of Andreessen Horowitz, said that to manage a marketplace well you need to “Maintain complete transparency in the marketplace so that participants (especially buyers but sellers too) have perfect information on products and their pricing [...] Focus heavily on safety so the marketplace is as safe as possible to create the trust requi
Tags : 
    
SendBird
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
De performance en manier van aanbieden van applicaties zijn veranderd. Moet uw netwerk ook veranderen? De cloud verandert hoe IT-teams applicaties aanbieden en de performance van die applicaties beheren. Applicaties komen steeds verder van de gebruikers af te staan en bevinden zich dan in netwerken waarover de eigen IT-afdeling geen rechtstreekse controle meer heeft. Veel apps staan niet meer in het datacenter van de organisatie, maar in een openbare of hybride cloudomgeving. Er bestaan tegenwoordige applicaties die zijn gebouwd op microservices en containers.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian
Published By: Corrigo     Published Date: Nov 01, 2019
Think about all the ways your life today is different than it was ten years ago. Think about how you shop, how you get around, how you plan travel, and how you stay in touch. So many things that used to be a hassle are now almost effortless. If your life feels different, it’s because you’re living in a new era – what experts are calling the 4th Industrial Revolution. You’ve probably heard some of the more catch-phrased components – big data, artificial intelligence, deep analytics. Some of these still seem like science fiction, but they are very real, very active, and crucial parts of what we at Corrigo call the Intelligence Economy. In the Intelligence Economy, data is collected, crunched, and activated to solve problems and create greater value for customers, partners, and employees. It’s the information, insights, and automations that enhance experiences, predict needs, strengthen connections, and deliver the right info or action at the right time, in the right way. And the Intellig
Tags : 
    
Corrigo
Published By: KPMG     Published Date: Oct 15, 2019
Around the globe, voices clamoring for climate-aware investing and carbon controlsare increasing. Demand for ethical treatment of employees, customers and other stakeholders is also growing, as is indignation about poorly-managed companies. Companies are subject to an increasing set of non-financial reporting requirements relating to environmental, social and governance (ESG) factors. A swathe of new requirements will soon impact the investment and lending appetites of EU financial institutions. Coupled with increasing investor demands, these new rules could have a profound impact on companies’ ability to raise capital, within the EU and beyond.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Achieving long-term profitability for 5G will require a major shift in thinking for many operators. Given the investments and capacity upgrades involved, simply treating 5G as just “another G” is a doomed strategy. Instead, 5G must be seen as an opportunity to re-energize the Telco business model and to move away from traditional commoditized network offerings. Download the discussion paper to learn: Five key questions the Telco C-suite should be asking to drive sustained 5G profitability Why 5G will require a major change in business strategy and IT delivery models How 5G can re-energize the Telco business model
Tags : 
    
Matrixx Software - Kingpin
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
As 5G is becoming a commercial reality in multiple lead markets, the question of how it should be positioned, packaged and priced will be critical in building competitive 5G propositions. Download the Strategy Analytics report to discover the results from end-user study groups and operator interviews, undertaken to answer a fundamental question: Are Telcos getting 5G right? Learn: How to build a 5G proposition to drive uptake, demand and profitability What consumers want from 5G services Where the opportunities and challenges are for operators, including content, unlimited data, enterprise offerings, network slicing, digital engagement, IoT etc.
Tags : 
    
Matrixx Software - Kingpin
Published By: ServiceNow     Published Date: Oct 23, 2019
The quality of data that your Configuration Management Database (CMDB) relies on is critical to helping you track the software assets coming into an organization from the point of inception to the point of disposition. That’s where Software Asset Management (SAM) can help.Download this whitepaper to understand how to use SAM to build a CMDB that helps you track the value of IT services, improve compliance, and scale to meet changing service demands.
Tags : 
    
ServiceNow
Published By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
"The practices of continuous integration, continuous delivery, and continuous deployment offer the promise of safer, faster, and more efficient software development. Critical to realizing this promise is the integration of application delivery and security services into the development and deployment workflows. F5 offers the platform, the integration, and the training to insert industry-leading application protection and optimization services into workflows so that software can be built, tested, and deployed with the services it needs to be secure, fast, and available. Download the solution guide to get all the details. "
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Intel     Published Date: Nov 14, 2019
Infrastructure considerations for IT leaders By 2020, deep learning will have reached a fundamentally different stage of maturity. Deployment and adoption will no longer be confined to experimentation, becoming a core part of day-to-day business operations across most fields of research and industries. Why? Because advancements in the speed and accuracy of the hardware and software that underpin deep learning workloads have made it both viable and cost-effective. Much of this added value will be generated by deep learning inference – that is, using a model to infer something about data it has never seen before. Models can be deployed in the cloud or data center, but more and more we will see them on end devices like cameras and phones. Intel predicts that there will be a shift in the ratio between cycles of inference and training from 1:1 in the early days of deep learning, to well over 5:1 by 2020¹. Intel calls this the shift to ‘inference at scale’ and, with inference also taking up
Tags : 
    
Intel
Published By: Intel     Published Date: Nov 14, 2019
Evaluating an existing HPC platform for efficient AI-driven workloads The growth of artificial intelligence (AI) capabilities, data volumes and computing power in recent years mean that AI is now a serious consideration for most organizations. When combined with high-performance computing (HPC) capabilities, its potential grows even stronger. However, converging the two approaches requires careful thought and planning. New AI initiatives must align with organizational strategy. Then AI workloads must integrate with your existing HPC infrastructure to achieve the best results in the most efficient and cost- effective way. This paper outlines the key considerations for organizations looking to bring AI into their HPC environment, and steps they can take to ensure the success of their first forays into HPC/AI convergence.
Tags : 
    
Intel
Published By: Intel     Published Date: Nov 14, 2019
You can migrate live VMs between Intel processor-based servers but migration in a mixed CPU environment requires downtime and administrative hassle A study commissioned by Intel Corp. One of the greatest advantages of adopting a adopting a public, private, or hybrid cloud environment is being able to easily migrate the virtual machines that run your critical business applications—within the data center, across data centers, and between clouds. Routine hardware maintenance, data center expansion, server hardware upgrades, VM consolidation, and other events all require your IT staff to migrate VMs. For years, one powerful tool in your arsenal has been VMware vSphere® vMotion®, which can live migrate VMs from one host to another with zero downtime, provided the servers share the same underlying architecture. The EVC (Enhanced vMotion Compatibility) feature of vMotion makes it possible to live migrate virtual machines even between different generations of CPUs within a given architecture.
Tags : 
    
Intel
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Sep 26, 2019
"Enterprises throughout the world are rapidly digitizing their operations and adopting a multicloud environment. Unfortunately, legacy WAN architecture models often do not provide the scale, flexibility or agility required to support this transition. Enter SD-WAN. No single platform will be able to deliver every piece in the jigsaw for every type of enterprise and every application-specific set of requirements. The key is to select vendor partners whose platforms are sufficiently open, modular and comprehensive in their functionality and components that they will be able to adapt to enterprises’ increasingly varied, flexible and exacting networking and compute requirements going forward. Only by doing so will they secure the ability to stay ahead in a multicloud future."
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
    
KPMG
Published By: Google     Published Date: Nov 04, 2019
"Modernizing apps on the cloud isn’t an “all or nothing” decision. Businesses want the option to modernize on-premises or choose multi-cloud solutions that meet their needs. That’s why we created Anthos, a new solution which lets you run your applications, unmodified, on existing on-prem hardware investments or in the public cloud. So that you write once and deploy anywhere. Download “Application modernization and the decoupling of infrastructure, services and teams” to find out more."
Tags : 
cloud as a service, cloud computing, enterprise security, cloud infrastructure, cloud providers
    
Google
Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: