shift

Results 301 - 325 of 903Sort Results By: Published Date | Title | Company Name
Published By: ExpertVoice     Published Date: Jun 17, 2019
I’m not sure if you’ve heard, but people keep talking about how we’re in the midst of a retail apocalypse. It’s this thing where lots of brick-and-mortar locations close down, and even entire companies go out of business. There’s quite a bit of blame to go around: The Great Recession, and Amazon, and private equity, and shifting consumer spending behaviors. In spite of the doomsday headlines, some brands continue to succeed, and a lot of those brands seem to be focusing on one thing: the customer experience. A good retail experience for a customer can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, according to this recent panel surveying retail employees, only 35% of retail employees feel as though training is effective. That’s a scary number for both retailers and brands, because without a well train
Tags : 
    
ExpertVoice
Published By: F5 Networks     Published Date: Dec 10, 2014
Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.
Tags : 
f5 networks, devops, agile, netops, data center, virtualization, sdn
    
F5 Networks
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
While the promises of reduced costs and greater flexibility are driving companies to the cloud, these benefits can be negated by new management and processes which are often manual and disconnected from existing systems. This white paper explores strategies that enables IT departments to embrace the shift to being a services-based organization without relinquishing the control necessary to ensure the security, performance, and reliable delivery of applications.
Tags : 
cloud, security, performance, reliable delivery
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the expanding boundaries of computing make it imperative for IT to ensure responsive systems. As a result, a confluence of technological advances has shifted the dynamics of application performance, putting a greater pressure on IT to improve application performance. Download this whitepaper to learn about new technologies that are in the marketplace that will help your business tackle this new demand.
Tags : 
cloud, mobility, productivity, application, application performance, networking speed, cloud computing, productivty
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : 
idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud
    
F5 Networks Inc
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
Published By: Financial Force     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
Financial Force
Published By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
FinancialForce
Published By: Fitbit     Published Date: Jan 28, 2019
Amid the shift to value-based care, reducing the burden of chronic disease is one of the biggest challenges facing the health care field today. This widely sought-after goal is beset by significant obstacles. A big part of the problem is lack of patient engagement, or patients not being adequately involved in care decisions and follow-up care.
Tags : 
    
Fitbit
Published By: Five9     Published Date: Apr 29, 2013
Far from being a reason to dismiss a cloud alternative,the increasing complexity of securing both company and customer data is a great reason to consider shifting applications to the cloud.
Tags : 
five9, cloud, cloud computing, cloud security, cloud alternative, data, securities and exchange commission, customer data
    
Five9
Published By: Five9     Published Date: Aug 01, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and guest experiences. This paper will provide one compelling r
Tags : 
    
Five9
Published By: Five9     Published Date: Oct 29, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and customer experiences. This paper will provide one compelling
Tags : 
    
Five9
Published By: Flexential     Published Date: Jul 17, 2019
In a data environment that’s become increasingly centralized by public cloud services, the “edge” is emerging as a critical solution for reducing latency for network-based services. Consumption habits of services and the need for analytics are shifting beyond core population centers, becoming local and even hyper-local within a region or city. As the online population continues to grow and new services emerge, the ability to handle data traffic securely – close to the customer or application – will become a common pattern for the new service evolution.
Tags : 
    
Flexential
Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management
    
ForgeRock
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
In recent years, data has had a resurgence being labeled as one of the newer trends in education. The reality is data and schools go hand in hand. The concept of collecting and utilizing data in education dates back as early as the 1800’s. So, what’s different and why now? Is it the increased availability, a better understanding of its potential, or signs that a long-awaited paradigm shift may be coming? I would argue it’s a combination of all three. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: FusionOps     Published Date: Jun 27, 2016
The term Industry 4.0 presupposes the passing of three major shifts in how businesses approached manufacturing throughout modern history, tracing its roots as far back as the 19th century: Industry 1.0: The Industrial Revolution redefines human limitations by harnessing the power of water and steam. Industry 2.0: Electricity pushes people and machines even further as manufacturing grows in scale and scope. Industry 3.0: The modern computer opens the door for automation
Tags : 
    
FusionOps
Published By: GE Healthcare     Published Date: Aug 27, 2015
Sharp is leading the way in the shift to shared risk. In this journey, they manage to the right financial metrics while still delivering appropriate care to their patient population. Watch the video to learn how GE Healthcare is helping Sharp make a difference.
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
    
GE Healthcare
Published By: GE Healthcare     Published Date: Aug 27, 2015
The shift to value-based reimbursement (VBR) entails more financial risk for providers. Successful management of the transition to VBR can only be achieved when healthcare organizations are clinically and financially integrated to ensure tight care coordination and efficient resource utilization. That level of integration requires the aid of a robust IT infrastructure to support the enterprise. This whitepaper offers the opportunity to learn about new tools for healthcare providers to manage financial challenges associated with value-based reimbursement
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing rcm, episodic payment, accountable care
    
GE Healthcare
Published By: GE Healthcare     Published Date: Jun 29, 2015
The financial environment in which healthcare providers operate has dramatically shifted with the passage of the Patient Protection and Affordable Care Act (ACA) and the associated market transformations in coverage, care delivery and reimbursement. Importantly, providers are taking on higher levels of risk. They are managing existing fee-for-service arrangements, a growing number of risk-based arrangements, care coordination with community partners, and quality reporting. The complex and changing landscape of how care is organized, measured and reimbursed is forcing financial leaders to seek out new approaches and tools to help them meet and adapt to healthcare reform. This paper will explore some of the market dynamics driving the financial volatility in healthcare and will explore how advanced analytics, with the right IT backbone and organizational competencies, can help organizations successfully identify ways to manage revenue cycle profitability.
Tags : 
    
GE Healthcare
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.