research

Results 351 - 375 of 2288Sort Results By: Published Date | Title | Company Name
Published By: Castlight Health     Published Date: Aug 02, 2016
In this report by Forrester Research, find out what 120 executives in the US with influence and decision-making responsibility regarding healthcare management do to manage costs and increase employee engagement.
Tags : 
    
Castlight Health
Published By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies
    
Catapult.
Published By: CBIZ     Published Date: Aug 27, 2013
With so many provisions and rules involved in the Affordable Care Act, its easy to get confused about what takes effect when. This timeline covers from 2010 through 2018 in a clear, 1-page layout. It also indicates what provisions apply to all plans and those which apply only to non-grandfathered plans.
Tags : 
timeline, aca timeline, patient-centered outcome research fee, fsa cap, summary of benefits coverage, notice of marketplace options, health care reform, affordable care act, aca, shared responsibility, grandfathered, waiting period, pre-existing conditions, annual limits, advance notice, exchange, federal marketplace, transitional reinsurance fee, public marketplace, individual mandate
    
CBIZ
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
Tools for extracting actionable insights from growing mounds of data are becoming smarter and easier to use. Organizations are awash in data generated by customers, supply chain partners and numerous other humanand machine-based sources. With the growth of the Internet of Things (IoT) starting to churn out even more data, many enterprises are considering how to transform their growing stores of raw information into actionable insights. Business intelligence (BI) and data analytics were once mostly limited to large enterprises, but 85 percent of small and midsize businesses have expressed interest in these solutions, according Gartner subsidiary Software Advice. Further, Accuray Research reports that the global business intelligence and analytics software market is poised to grow swiftly in the coming years to approximately $24 billion by 2020.
Tags : 
data, technology, data analytics, business intelligence, enterprise, data analytics
    
CDW
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate, insiders, anxiety, theft, stealing, steal, data, employees, protection, secure, conditions
    
CDW Symantec
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi, human resources
    
CEB
Published By: CEB     Published Date: Dec 09, 2013
This guide is designed to break down the complex challenge of mitigating third-party corruption risk into manageable components. Based on hundreds of member conversations and extensive research, we believe that successful companies conduct third party due diligence in five key phases.
Tags : 
corruption risk, managing risk, compliance, risk, anticorruption, third-party corruption
    
CEB
Published By: CEB     Published Date: Jul 01, 2014
If your organization is representative of trends at large, your workforce is more engaged than ever. But is all that enthusiasm, pride, and willingness being applied in directions that really matter to the company? See why organizations that measure more than just engagement drive real business results.
Tags : 
workforce survey, insight, tools, solutions, enterprise performance, research, human resources
    
CEB
Published By: CEB     Published Date: Nov 09, 2015
As an HR professional, you know the spotlight is on recruitment functions to prove their value to the business. Youve seen how the volume of job applications has risen over the last few years, yet all it has done is create more work and rarely better outcomes for candidates, recruiters or employers. Based on CEB research, this eBook uncovers the insights and solutions to overcome these volume recruitment challenges: How to create an effective employer brand How to optimize the candidate experience How to make the recruitment process more efficient
Tags : 
recruitment, recruiting, volume recruitment, volume hire, volume recruiting, high volume recruitment, high volume recruiting, applicant sifting, candidate sifting, sifting applications, large scale recruiting, graduate recruitment, pre-hire, pre-hire assessments, ability tests, employer branding, employer brand, candidate experience, talent assessments, human resources
    
CEB
Published By: CEEOA     Published Date: Dec 03, 2010
CEEOA released its annual report on the state of IT outsourcing service providers market in the CEE region 'Central and Eastern Europe IT Outsourcing Review 2010'.
Tags : 
it outsourcing, software development, research, cee region
    
CEEOA
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape is changing and this is creating opportunities for how businesses use and manage energy. We wanted to understand the experience businesses are having, how they are adapting to the changing energy market and how this compares to their peers. We researched over 1,000 energy decision-makers in large organizations across six countries and The Energy Advantage Report is the outcome. It identifies how businesses are gaining competitive advantage through their energy strategies and solutions and provides practical advice on how to get more from energy.
Tags : 
energy, advantage, report, business, growth
    
Centrica Business Solutions
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the zero trust concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrifys Zero Trust Security approach, as well as explores its Next-Gen Access platform, which provides a solid foundation for enterprises setting out on their zero-trust journey.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in todays business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of todays demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: CenturyLink     Published Date: Jan 02, 2015
Accelerate time to market and dramatically reduce costs with hybrid cloud. See how Cancer Research UK has done it with CenturyLink Technology Solutions.
Tags : 
hybrid cloud, time to market, it solutions, hybrid cloud solutions
    
CenturyLink
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether its self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology consumer-grade has become a standard, and its ITs job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
    
Cherwell Software
Published By: Cherwell Software     Published Date: Apr 07, 2016
Seattle Cancer Care Alliance (SCCA) serves as the clinical arm for research and treatment studies for Fred Hutchinson Cancer Research Center, University of Washington Medicine, and Seattle Childrens. The organizations outsourced IT service desk operated adequately, but a desire for financial savings, enriched customer relationships, and improved HIPAA compliance drove SCCA to seek out another solution.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena
Published By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale
    
Cisco
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
Read how Internetwork Engineering's customer, NCCAR, a NC based automotive research facility relies on Cisco Borderless Network to keep engineers connected to data and services anywhere, anytime.
Tags : 
cisco, engineering nccar, north carolina, borderless network, data, services, networking, auto, development
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
With maturity comes clarity, and the choice between public, private or hybrid cloud deployments is a prime example. According to a recent IDG Research Survey, private and hybrid cloud adoption is gaining strength at organizations of all sizes, and has the power to serve as a competitive advantage. However IT leaders must address certain barriers to fulfilling the promise of a private or hybrid cloud initiative.
Tags : 
cisco, private cloud, idg research survey, hybrid cloud
    
Cisco
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.