claim

Results 126 - 150 of 175Sort Results By: Published Date | Title | Company Name
Published By: Jobvite     Published Date: May 15, 2013
Can you directly link your recruiting sources to successful employee performance? Don’t worry. Only 22% of organizations claim to have mastered this skill, according to a recent Analyst Insight report from Aberdeen Group. Download your report now.
Tags : 
new hires, jobvite, recruiting, job placement, job recruiting, new staff, staffing, hire management, hiring tools, social hiring, social recruiting
    
Jobvite
Published By: SAP     Published Date: Jun 04, 2010
Small and medium-sized businesses (SMBs) around the world are facing a competitive environment more intense than ever. Changes in the economic environment that began in 2008 (and earlier in some places) have altered business fundamentals forever. Larger competitors are increasingly interested in capturing the customers that SMBs previously were able to claim uncontested. Download now to learn more.
Tags : 
sap, smb, economic environment, lean, revenue
    
SAP
Published By: Drobo     Published Date: Feb 14, 2012
Storage does not have to be costly SMBs take advantage of new technology on the market.
Tags : 
storage, networking, mac, windows, linux, drivers, provisioning, reclaimation, data centers, servers, virtual machines, virtualization, cloud computing, infrastructure, design and facilities
    
Drobo
Published By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data, claims data, actuarial data
    
IBM
Published By: IBM     Published Date: May 27, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, big data, analytics, insurance, insurance industry, big data solutions, integration, risk assessment, policy rates, customer retention, claims data, transaction data
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media.
Tags : 
big data, ibm, claims operations, customer service
    
IBM
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
Cylance
Published By: IBM     Published Date: Apr 23, 2013
The current business environment is still characterized by skittishness, tenuous demand and sporadic growth. It’s no surprise then, that 60% of CFOs plan to make major changes to critical finance practices and processes, according to the 2010 IBM Global CFO Study. In fact, 70% of CFOs claim to be taking a more prominent role in enterprise decision making beyond the traditional role of finance. Yet many CFOs admit to significant gaps in their ability to deliver on this expanded agenda, particularly in their ability to measure and monitor business performance. The IBM study found that those companies that invest in capabilities to expand their business insight are better able to anticipate and react to the unpredictable external forces affecting the economy.
Tags : 
dynamic planning, forecasting, financial forecasting, finance, cfo, enterprise, corporate governance
    
IBM
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications, small business, finance
    
Avalara
Published By: HP     Published Date: Jul 22, 2014
HP 3PAR StoreServ thin deduplication is the latest feature in a line of thin technologies, including thin provisioning, thin persistence and thin reclaim that deliver value and cost savings to the customer. Each of the technologies is fully built-in to the 3PAR StoreServ architecture. In this study, HP 3PAR StoreServ was compared to competing all-flash offerings from SolidFire, Pure Storage and EMC.
Tags : 
3par, deduplication, thin, technology, storeserv, all-flash, storage, data management, business technology
    
HP
Published By: K2     Published Date: Jan 07, 2016
Is it time to reframe BPM through a modern lens? This is what a recent Forrester report claims, after conducting an online survey of over 3,300 businesses. While 33 percent of companies are already implementing or using a BPM solution and an additional 30 percent are interested in using BPM, only 17 percent of companies made a formal request to use BPM in the last year.
Tags : 
bpm, business process management, forrester report, bpm solutions, networking, security, it management, wireless
    
K2
Published By: IBM     Published Date: Nov 12, 2013
A Smarter Process vision for healthcare. We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar - in the way they engage customers throughout the entire sales process -not just during the commercial transaction, but before, during and after the transaction. Can healthcare and life sciences meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management, information management
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
A Smarter Process vision for healthcare. We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar - in the way they engage customers throughout the entire sales process -not just during the commercial transaction, but before, during and after the transaction. Can healthcare and life sciences meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management, business analytics, business intelligence, content management system, document management, information management, search and retrieval, information technology
    
IBM
Published By: IBM     Published Date: Apr 13, 2015
Reducing the price of slow-selling product lines can be an effective way to drive sales and reclaim valuable selling space – but how do retailers ensure that these markdowns are profitable? Read this case study to learn how Coop Danmark replaced its complex markdown spreadsheets with Markdown Optimization solutions from IBM. Today, the company has deep insight into the optimal percentage and duration for markdowns, based on customer demand forecasts and inventory data at each retail store. This helps the company to boost sales while protecting margins.
Tags : 
profitablility, ibm, markdown, optimization
    
IBM
Published By: IBM     Published Date: Feb 05, 2015
Revealing new insights into agency performance, claims processing, customer profitability and exposure.
Tags : 
agency performance, claims processing, customer probability, advanced analytics
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management, database security, business technology
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security, it management, knowledge management, data management
    
IBM
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration
    
HP Virtualization
Published By: IBM     Published Date: Apr 10, 2013
Your goal is clear—produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize up time and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
predictive, maintenance, manufacturing, productivity, minimize, downtime, reduce, cost-control
    
IBM
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Published By: Kapost     Published Date: Feb 20, 2014
Just about everyone claims to be doing content marketing, but far fewer organizations have a thought-out plan. According to Content Marketing Institute, only 44% of B2B marketers and 39% of B2C marketers have a documented content strategy. But as organizations scale content operations, workflows, distribution, and promotion, many are seeking tools to centralize, manage, and improve the process. That’s where content marketing software comes in. This software can help organize, automate, and visualize your efforts to create original content, as well as curate the content of others.
Tags : 
    
Kapost
Published By: Xero     Published Date: Feb 18, 2014
Learn how you can use Use Xero Touch to manage your business while you’re on the move. Reconcile, send invoices and create expense claims – from anywhere.
Tags : 
xero, xero touch, invoices, billing, finances, small business billing, finance, iphone, blackberry, android, business technology
    
Xero
Published By: CA Technologies     Published Date: Oct 08, 2014
In this Gigaom Research Webinar, we will examine the impact mobility has had on application development, the pain points experienced when businesses try to manage mobile development across the enterprise, and the role automation, DevOps and other rapid development tools play in moving IT from inhibitor to enabler.
Tags : 
ca technologies, mobile applications, application development, mobile apps, apps, mobile development, devops
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept