business approach

Results 351 - 375 of 482Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management
    
SAS
Published By: Pentaho     Published Date: Mar 09, 2011
In this white paper, Pentaho Agile BI: An iterative methodology for fast, flexible and cost-effective Business Intelligence, Pentaho Chief Geek/CTO, James Dixon, dispels why old technologies, pricing and approaches used for Business Intelligence are not well suited for today¹s environment.
Tags : 
pentaho, agile bi, business intelligence
    
Pentaho
Published By: Taleo     Published Date: Feb 01, 2012
This paper is the second in a five part series that explores the role of business leaders in driving talent management functions and the specific tools and approaches that will make them successful.
Tags : 
human resources
    
Taleo
Published By: BMC Software     Published Date: Oct 21, 2013
The adoption of cloud-based solutions demands that the business take a look at the skills needed for success. BMC explores how the right IT Service Management approach can drive user satisfaction and organizational success.
Tags : 
bmc, bmc software, cloud computing, cloud service, service management, it agility
    
BMC Software
Published By: QTS Data Centers     Published Date: Feb 17, 2017
According to the 2016 Enterprise IT Spending Benchmarks, compiled by 451 Research, North America will exceed $1 trillion in IT spending by 2017. Businesses of all sizes are expected to move to a hybrid IT approach. When choosing a hybrid approach, you need both on-site and cloud resources that are reliable and well maintained. The easiest way to assure this is by streamlining your data center solutions through a single, fully integrated service provider.
Tags : 
    
QTS Data Centers
Published By: Webroot Inc     Published Date: Sep 14, 2015
Webroot SecureAnywhere® Business Endpoint Protection is the next generation of endpoint security. It's smarter, faster, more effective, and easier to use and deploy than traditional solutions. Learn about our unique approach to endpoint security and more in our complimentary eBook.
Tags : 
endpoint protection, security software, user protection
    
Webroot Inc
Published By: Polycom     Published Date: Sep 09, 2016
For decades, the predominant model for deploying voice technology was on premises. However, over the past five years, the opinion of cloud-based voice services, such as Office 365, has changed dramatically. Just five years ago, the majority of businesses either felt that cloud unified communication was not viable or were taking a wait and see approach. Today, the majority of respondents are planning a minor or major cloud UC purchase. For Microsoft customers, Skype for Business in Office 365 provides an excellent alternative to a traditional premises-based deployment.
Tags : 
    
Polycom
Published By: Exablox     Published Date: Jan 27, 2015
Your information is a core business asset and differentiator. But traditional data storage can add costs disproportionate to its potential value. How can you drive down your total cost of ownership and eliminate unnecessary costs, without compromising enterprise class features? Eliminate storage costs that undermine the business value of your organization’s information. In this fourth of a series of informative e-books from Exablox, we take a look at the costs of traditional storage approaches, and offer simple, practical ways that you can cut these costs while getting more for your money.
Tags : 
storage cost, cut storage cost, storage tco, data storage cost, exablox, oneblox
    
Exablox
Published By: Exablox     Published Date: Jan 27, 2015
Traditional storage management can be complex, confusing, and and configuration involved can be overwhelming. Scaling and replication can often be time consuming and frustrating, if not practically impossible. The time and complexity required can drive small and midsize businesses to engage expert consultants just to manage their data storage solution and optimize it for their application requests. You’ve got more on your plate to manage than just storage. In this third of a series of informative e-books from Exablox, we take a look at the difficulties of traditional storage approaches, and offer simple, practical ways to make your data storage easier to manage.
Tags : 
data management, data storage solution, new storage approach, storage management, simple data storage management, exablox, oneblox
    
Exablox
Published By: Exablox     Published Date: Jan 27, 2015
When it comes to the increasingly complex task of managing data storage, many small and midsize organizations face even greater challenges than large, global enterprises. Small and midsize companies have ever-increasing volumes of information to manage and secure, and they are confronting a number of difficulties when it comes to storage. Among the biggest hurdles: ›› Scaling storage as the business grows rapidly ›› Meeting the rising expense of data storage capacity ›› Dealing with the complexity of management and architecture ›› Devoting precious staff time managing storage and data backup Whereas larger organizations have significant IT budgets and staff to handle storage-related challenges, small and midsize companies lack the IT resources to dedicate to storage management. Fortunately, there are new approaches to data storage on the market that can help such companies address their data storage needs without requiring dedicated storage management resources, while at the same ti
Tags : 
scaling storage, data storage capacity, data backup, data protection, data management, exablox, oneblox
    
Exablox
Published By: Polycom     Published Date: Nov 29, 2016
For decades, the predominant model for deploying voice technology was on premises. However, over the past five years, the opinion of cloud-based voice services, such as Office 365, has changed dramatically. Just five years ago, the majority of businesses either felt that cloud unified communication was not viable or were taking a wait and see approach. Today, the majority of respondents are planning a minor or major cloud UC purchase. For Microsoft customers, Skype for Business in Office 365 provides an excellent alternative to a traditional premises-based deployment.
Tags : 
    
Polycom
Published By: Lola Travel Company     Published Date: Jan 24, 2019
Think you can survive without a corporate travel policy, and continue having employees book trips on their own without harming your company? Think again. Check out this must-read e-book, "Do You Need a Corporate Travel Policy?" from Lola.com and learn: The 5 must-haves in a corporate travel policy Shocking stats about business travel impact on employee job satisfaction How to save time/money, lose stress with an employee-friendly travel policy Decide for yourself if a “wild west” business travel approach with “rogue employees” is smart for your business (hint: it’s not!). DOWNLOAD THE E-BOOK NOW!
Tags : 
    
Lola Travel Company
Published By: IBM     Published Date: Nov 14, 2013
IBM Business Process Manager is a business process management platform designed to help enhance the visibility and management of an organization's business processes. Read this white paper to learn how you can help enable the optimization of the business value of your SAP implementation by using a BPM approach.
Tags : 
business operations, business process management, bpm, process automation, smarter process, smarter process approach, agility, analytics
    
IBM
Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
Examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud prevention technology, fraud loss reduction, operating costs
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data
    
IBM
Published By: IBM     Published Date: Aug 29, 2016
How to utilize the cloud for your B2B (Business-to-Business) needs and remain focused on the core of your business. Simplify your approach and drive collaboration with your customers and suppliers.
Tags : 
ibm, b2b, cloud, integration, b2b integraton, business to business
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library