groups

Results 26 - 50 of 173Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Nov 02, 2016
Scaling Agile means that we apply its principles to large, even very large, groups of people. When we do this, we allow those people to be more connected to their work and its impact, despite being part of a huge system.
Tags : 
    
CA Technologies
Published By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : 
risk, compliance, audit, risk management, cyber security, fraud
    
CEB
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
    
Okta
Published By: LifeLock     Published Date: May 10, 2016
Affinity groups, human resources organizations, and customer-facing companies search regularly for new ways to engage their targets. But how does that human resources organization, affinity group, or customer-facing company settle on that perfect “something extra”? Download now and find out how an out of the box idea can help maintain customer loyalty and protect your brand.
Tags : 
    
LifeLock
Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
digital marketing, operations, big data, analytics, web content management, content management systems, it management, data management
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
    
Progress
Published By: Bluecore     Published Date: Mar 04, 2019
Historically, this diversity in both product assortment and customers presented unique challenges for Discount School Supply when it came to matching unique groups of customers to the products that fit their needs. Recognizing the importance of overcoming this challenge, Peter Walter, Director of eCommerce Marketing at Discount School Supply, began the search for a solution. That search led him directly to Bluecore.
Tags : 
    
Bluecore
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Bancolombia is an award winning, full-service financial institution that provides banking services to customers in 12 different countries and is one of the 10th largest financial groups in Latin-America.With bots from Automation Anywhere, Bancolombia sifts through structured, semi-structured, and unstructured customer data to transform their BPM. Bots automate hundreds of processes and greatly increasing back office efficiency, saving Bancolombia a significant amount of time servicing customers. This has led to an increase in CSAT numbers and has created additional revenue streams.
Tags : 
    
Automation Anywhere APAC
Published By: athenahealth     Published Date: Sep 05, 2013
Healthcare mergers and acquisitions and medical group growth have been strong industry trends for years. One reason is the desire for critical mass to gain leverage with payers as reimbursement declines and costs increase. Healthcare mergers and acquisitions may offer benefits for many medical groups; it is not without its challenges. Read this whitepaper to learn how to successfully manage growth of your medical group.
Tags : 
group practice growth, strategies for success, healthcare mergers, medical group growth, medical group
    
athenahealth
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: VMware     Published Date: Jun 24, 2019
Management is demanding more efficiency and cost optimization from internal IT groups. Independent research data shows VMware’s HCI offering provides better economics than other solutions. Leveraging current IT skills, infrastructure and operational processes creates a foundation for both Capex and Opex savings that will continue for years to come, with increased operational simplicity that will allow IT to better respond to business demands.
Tags : 
    
VMware
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement
    
Allscripts
Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence, cloud computing
    
Okta
Published By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides it’s time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
    
PwC
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Here Technologies     Published Date: Jul 26, 2019
Driver recruitment and retention are proving to be major problems for the trucking industry. The truck driver shortage is worse than ever, and driver turnover is at an all-time high. This leaves fleet owners and trucking companies trapped in constant recruitment mode costing them valuable time and resources. HERE Technologies explores three ways fleet owners can avert the driver staffing crisis and improve recruitment and retention leading to better, stronger fleets. With this eBook, discover: • Effective ways to offer benefits, incentives and competitive pay • Strategies to increase truck driver safety with technology • How to attract two of the largest groups in the US labor force
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Oracle     Published Date: Jan 28, 2019
Databases tend to hold an organization’s most important information and power the most crucial applications. It only makes sense, then, to run them on a system that’s engineered specifically to optimize database infrastructure. Yet some companies continue to run their databases on do-it-yourself (DIY) infrastructure, using separate server, software, network, and storage systems. It’s a setup that increases risk, cost, complexity, and time spent deploying and managing the systems, given that it typically involves at least three different IT groups.
Tags : 
    
Oracle
Published By: CA WA 2     Published Date: Oct 01, 2008
Featuring an expert from Enterprise Management Associates, this webcast discusses some tactical steps towards automation of various IT processes, showing how even in processes with interdependent tasks, IT Process Automation can start IT groups down the path of reducing complexity and error rates, two of the leading drivers of cost and chaos.
Tags : 
ca wa, ca wa 2, process automation, it process, bpa, business process automation, it management, webcast, business process management, spend management
    
CA WA 2
Published By: Nutanix, Inc.     Published Date: May 07, 2013
This report defines storage-centric virtualized infrastructure, its opportunity and use cases, and the emerging vendor landscape that IT infrastructure and operations groups should evaluate as they purse the software-defined data center.
Tags : 
converged infrastrucutres, storage, virtualization, server, storage-centric, lun, modular expansion, backup and recovery, blade servers, clustering, storage management, storage virtualization, best practices, server virtualization, infrastructure
    
Nutanix, Inc.
Published By: CareCloud     Published Date: Sep 09, 2014
In an increasingly complex business environment, U.S. physicians are banding together into mega groups that gain leverage with payers without sacrificing independence. Innovative technology platforms are playing a major role in making it happen. One leading mega-group shares its story.
Tags : 
carecloud, mega group, complex business environments, us physicians, innovative technology platforms
    
CareCloud
Published By: CEB     Published Date: Dec 03, 2014
As deal complexity has risen, so too has customers' risk aversion and the number of stakeholders dedicated to a given purchase. The best companies build consensus among diverse groups by tapping into the right values and fostering an environment of collective learning.
Tags : 
b2b marketing insights, b2b sales insights, consensus marketing, b2b branding, b-to-b decision-makers, leading marketing and sales teams, sales executives, sales leaders
    
CEB
Published By: DrFirst     Published Date: Mar 13, 2015
Secure, efficient communication between doctors and staff is key to reliable patient care. For Groves Community Hospice, every situation involving patients requires rapid response; this poses a particular challenge, as more than 80 percent of the hospice staff work in the field. With so many doctors and staff off-site or on-call, and considering the inherent urgency of hospice care, Groves needed to streamline staff communications and enable a better way for physicians and staff to connect and discuss critical patient issues within a secure environment.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response
    
DrFirst
Published By: DrFirst     Published Date: Mar 13, 2015
Long-term care facilities are highly regulated institutions that are often reluctant to implement new health technology. Cedar Creek Nursing Center chose Akario Backline® secure chat to help improve care transition processes by minimizing phone calls and faxes.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response, message, regulation, staff
    
DrFirst
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.