erp

Results 1 - 25 of 7774Sort Results By: Published Date | Title | Company Name
By: GE Healthcare     Published Date: Dec 10, 2012
Centricity Clinical Archive solution1 is a multi-ology, multi-site vendor-neutral solution that transforms rigid departmental silos into fluid information sharing systems. Centricity Clinical Archive offers healthcare enterprises
Tags : 
healthcare management
    
GE Healthcare
By: GE Healthcare     Published Date: Dec 14, 2012
Multi-layered neutrality: A new standards-based framework for unifying medical images and clinical documents across the enterprise
Tags : 
healthcare management
    
GE Healthcare
By: IBM United Kingdom Limited     Published Date: May 24, 2011
Introduction and overview eHealth offers a potent means for health services in EMEA, and worldwide, to tackle the daunting challenges of the 21st century. Ageing populations, long-term management of chronic illnesses, escalating costs1, changing patterns of disease, and a worldwide shortage of healthcare workers are all driving the need for health information and communication technology (ICT) to improve healthcare administration and delivery. For future sustainability, the healthcare system demands efficient and affordable access to finite healthcare resources, improving care for all and reducing healthcare inequalities. To achieve its potential, eHealth must facilitate the secure movement of patient data out of system silos and transform it into intelligence for improved patient administration and enablement of patient-centred, coordinated care.
Tags : 
ehealth, health services, ageing populations, escalating costs, shortage of healthcare workers, ict, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
IBM United Kingdom Limited
By: Imprivata     Published Date: Jul 02, 2010
Liverpool Women's NHS Foundation Trust is one of the leading hospitals in the UK providing healthcare to women and babies. The Trust has about 1,600 employees, all devoted to supporting its mission to deliver the highest quality care in the fields of maternity, neonatology, gynaecology, and reproductive medicine. A 350-bed teaching hospital, the Trust admits 40,000 patients annually, while treating another 12,000 in the ER and 100,000 in outpatient consultation. Liverpool Women's NHS Foundation Trust is a centre of excellence in the provision of undergraduate and post-graduate medical education and training, and it is also actively involved in the training of nurses, midwives, and other professional staff.
Tags : 
womens health, passwords, mental health, policy, finance, it, legal, commissioning
    
Imprivata
By: Imprivata     Published Date: Jul 13, 2010
Whether prompted by the compliance requirements of HIPAA or GLBA, the growing need to strengthen IT security, or mounting user frustration due to forgotten passwords, more and more organizations are thinking seriously about implementing Enterprise Single Sign-On (ESSO). According to Giga Research analyst Steve Hunt, "Enterprise SSO works well and makes sense. It is a secure, cost effective tool for adding value to an organization. It would be wise for vendors to implement it today."
Tags : 
enterprise single sign on, it
    
Imprivata
By: Proofpoint Limited     Published Date: Apr 27, 2011
More than ever before, enterprises are under pressure to protect private data. Part of the pressure comes from the chilling examples of companies who failed to protect private data and then paid a high price in regulatory fines, disaffected customers, lost business, and damaged brands. Part of the pressure comes from knowing just how frequently data breaches occur. In a recent survey of email decision makers at large U.S. companies, 34% reported that their business had been affected by the leak of sensitive or embarrassing information in the past year, 33% had been affected by the improper exposure or theft of customer information, and 28% had been affected by the improper exposure or theft of intellectual property. Thefts are common. Leaks are common. Enterprises, even cautious ones, are plainly at risk. Proofpoint Encryption can help keep private data in email secure.
Tags : 
encryption, security, private data, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
Proofpoint Limited
By: Proofpoint Limited     Published Date: Apr 27, 2011
The very best anti-spam solutions today deliver 95% effectiveness. Unfortunately, that's not good enough. A border-line attack that gets through a 5% gap in defenses could cost your organization millions of dollars in terms of business lost, exposure to privacy threats, and brand loyalty. This white paper discusses the ongoing evolution of spam threats and the technology needed to close that remaining 5% gap in defenses. To defeat spam, enterprises need a holistic approach rather than an uncoordinated collection of features and filters. By systematically tying features together through real-time machine learning and analysis, enterprises can increase the effectiveness of their spam defenses to nearly 100%.
Tags : 
anti-spam, privacy threats, spam threats, technology, spam defenses, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
Proofpoint Limited
By: Proofpoint Limited     Published Date: Apr 27, 2011
Enterprise IT departments need guidance for deploying eDiscovery applications and for crafting Service Level Agreements (SLAs) with cloud service providers, so that new cloud computing initiatives don't undermine the enterprise's investments in eDiscovery. This paper offers guidelines for evaluating cloud service providers and for defining SLAs that meet the business and IT goals of cloud computing as well as the legal requirements for eDiscovery.
Tags : 
ediscovery applications, crafting service level agreements, slas, cloud service providers, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
Proofpoint Limited
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
By: LiveAction     Published Date: Apr 26, 2019
In March of 2019, Sirkin Research was commissioned by LiveAction to identify the driving forces of network transformation and how the rapidly evolving network environment is impacting network professionals. It is well recognized that network transformations, such as SD-WAN, WiFi, and multi-cloud, edge computing among other trends, are creating a host of new challenges and opportunities for network operations. This research is based on responses from over 163 network and IT professionals in predominantly in enterprise organizations with at least $1 billion in revenue Attached is also the target account list.
Tags : 
    
LiveAction
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
    
MalwareBytes EMEA
By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
By: Sage EMEA     Published Date: May 13, 2019
Enterprises must continuously change to keep ahead of the competition, reduce silos, improve connectivity and respond rapidly to a changing world. Organisations also need to drive continuous innovation with technology that helps them adapt faster. So if you’re thinking of replacing your legacy ERP system, start by asking yourself these three essential questions:
Tags : 
    
Sage EMEA
By: Sage EMEA     Published Date: May 13, 2019
Your ERP system might be out of date and too complex to handle your industry’s challenges. Should you upgrade to an enterprise management solution? Now you can. Here are 4 reasons why
Tags : 
    
Sage EMEA
By: Sage EMEA     Published Date: May 13, 2019
There is a better way for manufacturers, distributors, service providers and mid-market enterprises to drive their companies forward.
Tags : 
    
Sage EMEA
By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 10, 2019
This LTI Point of View explores how ‘Digital’ is a key enabler for enterprise transformation, and the change in thinking and culture, is it’s real driver. To compete in today's tough marketplace, organizations need a strong digital core. It highlights the fact that an effective digital transformation is built on people, processes, hardware, and software. And true transformation occurs when these elements can be intelligently harnessed in real-time.
Tags : 
    
Larsen & Toubro Infotech(LTI)
By: Equinix EMEA     Published Date: May 17, 2019
A nivel mundial, los pagos se están volviendo digitales, ya sea en su conversión de dinero en efectivo a tarjetas, códigos QR en el punto de venta (POS), compras desde tiendas físicas a tiendas on line con formas de pago electrónicas o pagos realizados a través de una aplicación. Este fenómeno no es nuevo, y parece estar acelerándose. Esta velocidad de adopción se debe a múltiples factores, incluida una gran cantidad de nuevos métodos de pago electrónicos, muchos de los cuales se superponen a los métodos de pago existentes, enfocados en la conveniencia, la velocidad y la experiencia general del consumidor.
Tags : 
    
Equinix EMEA
By: IBM APAC     Published Date: May 14, 2019
IBM PowerAI Enterprise helps to make deep learning easier and faster for organizations by bringing together some of the most popular open source frameworks for deep learning, with development and management tools in a single installable package. Designed to simplify end-toend deep learning, PowerAI Enterprise allows enterprises to spend less time on data preparation, implementation and integration, and more time training neural networks for results. IBM PowerAI Enterprise version 1.1.2 includes the most popular deep learning frameworks in one installation: - BVLC Caffe - IBMCaffe - TensorFlow - PyTorch - Keras (tensorflow-keras)
Tags : 
    
IBM APAC
By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
By: IBM APAC     Published Date: May 14, 2019
If anything is certain about the future, it’s that there will be more complexity, more data to manage and greater pressure to deliver instantly. The hardware you buy should meet today’s expectations and prepare you for whatever comes next. Power Systems are built for the most demanding, data-intensive, computing on earth. Our cloudready servers help you unleash insight from your data pipeline — from managing mission-critical data, to managing your operational data stores and data lakes, to delivering the best server for cognitive computing. With industry leading reliability and security, our infrastructure is designed to crush the most data-intensive workloads imaginable, while keeping your business protected. - Simplified Multicloud - Built-in end-to-end security - Proven Reliability - Industry-leading value and performance
Tags : 
    
IBM APAC
By: Here Technologies     Published Date: Mar 29, 2019
By making use of the right technology, transportation and logistics (T&L) companies can reinvent their industry with superior customer service, increased revenues, and reduced costs. This whitepaper looks at the obstacles facing the T&L industry and examines how fleet planning and trip analysis software businesses can help by enabling faster and smarter data-driven decision-making. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE can help T&L companies improve fleet management.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.