ims

Results 176 - 200 of 368Sort Results By: Published Date | Title | Company Name
By: Crimson Hexagon     Published Date: Oct 10, 2013
Understand the impact of social media in Born Sinner vs Yeezus on same day album release.
Tags : wom, word of mouth, social media conversation, online conversation, earned media, online consumer opinion
     Crimson Hexagon
By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn the results from contextual analysis of millions of social media conversations surrounding Vine before and after the launch of Instagram video.
Tags : instagram, vine, consumer insights, online conversation, mobile video sharing, social media analysis
     Crimson Hexagon
By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this paper to learn how Crimson Hexagon performed contextual analysis of millions of social media conversations surrounding The Great Gatsby to find out exactly what people are saying about it on Twitter.
Tags : online conversation, social media conversation, twitter
     Crimson Hexagon
By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data, third-party data, first-party data, digital marketing, single factor correlation, multiple factor correlation, predictive audience models, custom audiences, offline data, effective marketing practices, digital marketers, marketing funnel, trusignal
     TruSignal
By: STARLIMS     Published Date: Apr 16, 2014
Learn how Laboratory Information Systems (LIS) are becoming outdated and see how they are being replaced by Information Management Systems that can provide flexible management capabilities that provide informatics solutions.
Tags : starlims, lims, laboratories, lis systems
     STARLIMS
By: STARLIMS     Published Date: Apr 16, 2014
Learn about the specific needs of most Biorepositories and see what data management solution is right for you.
Tags : starlims, biorepository, lims, data management systems, data management
     STARLIMS
By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System can improve trace evidence management in the crime lab, but will also help analysts with data entry, documentation, and quality control.
Tags : starlims, lims, trace evidence management, crime lab, quality control, it management, data management
     STARLIMS
By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System reduced turnaround time for all system functions by an average of 50% for a pharmaceutical manufacturer.
Tags : starlims, flexible electronic canvas, lims, data management
     STARLIMS
By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Scientific Data Management System (SDMS) allowed a pharmaceutical manufacturer to drastically cut costs while also boosting the productivity of all of the company’s employees.
Tags : starlims, sdms, productivity, data management
     STARLIMS
By: Castlight Health     Published Date: May 06, 2014
Poor quality of care takes a tremendous toll, not just on the system as a whole, but on the patients and their families at the center of that system. It also has a tremendous effect on employers, who already face unsustainable health care costs. When we evaluated one of our customer's claims, we found numerous signs of preventable complications that had cost our client significant amounts, not to mention the toll on the individual. Specifically, we identified the following preventable hospital- acquired conditions (HACs): • Fourteen instances of stage III and IV pressure ulcers • Twelve instances of vascular catheter-associated infections • Thirteen instances of catheter-associated urinary tract infections • One instance of a patient dying or experiencing a serious disability associated with intravascular air embolism • Five instances of foreign objects remaining in patients after a procedure. Please download the whitepaper to learn more!
Tags : healthcare, healthcare quality, intravascular air embolism, preventable complications, castlight health, hospital-acquired conditions, medical errors, health insurance, inappropriate care, unsustainable costs
     Castlight Health
By: FICO     Published Date: Aug 14, 2015
Learn how FICO's Blaze Advisor system enables Aviva's vision of doubling business volume and improving customer service.
Tags : fico, analytics, solutions, decision management, rules management.
     FICO
By: Fitbit     Published Date: Nov 12, 2018
A basketball partnership that walks the walk, literally. Employees of the Minnesota Timberwolves get stepping. In 2017, the Minnesota Timberwolves teams signed on to partner with Fitbit. This new sponsorship not only included a Fitbit patch on all team jerseys, but an opportunity to work together both on and off the basketball court. For starters, the Timberwolves knew that creating a culture of wellness was a natural next step for the Fitbit partnership. Learn how this NBA organization: ? Launched a successful wellness program through Fitbit Health Solutions ? Kept momentum (and step counts) high on game days ? Experienced cost decreases on medical claims
Tags : 
     Fitbit
By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : social, engineering, fraud, cyber, security, scams
     FICO
By: Zebra Technologies     Published Date: Sep 12, 2018
Detecting and preventing errors that threaten patient safety is a closed-loop process that begins at the point of care, extends to independent laboratories, and then back to the caregiver. Sample identification and results reporting errors can lead to misdiagnosis and inappropriate treatment with deadly consequences. A 2006 Wall Street Journal article reported that while malpractice claims for pathology errors are relatively low, they are the second most costly. In addition to creating a serious risk to patient safety, sample misidentification creates significant financial implications. Redraws, retesting and additional treatment that result from sample errors cost the healthcare industry an estimated $200 million to $400 million per year.
Tags : 
     Zebra Technologies
By: Epson     Published Date: May 10, 2018
This paper aims to: • Summarize recent developments in the current state of mobile transaction technology, with an emphasis on line busting as a part of mPOS systems • Highlight studies that point to mobile transaction’s projected significant short-term growth • Outline the business benefits of both mobile transactions and line busting • Provide in-depth guidance on how to evaluate mPOS systems for line-busting applications
Tags : 
     Epson
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : security, virtualization, security approaches, kaspersky
     Kaspersky
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky
     Kaspersky
By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : security, technology, security tactics, data
     Cisco
By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something it’s not built to do, and just as frustrating to expect a service provider to do things beyond their capability — regardless of their claims during the sales cycle. So don’t do that — build your security monitoring program to give all parties the best chance of success.
Tags : security, analytics, siem, monitoring, skills, capabilities, outsourcing
     McAfee EMEA
By: MuleSoft     Published Date: Jun 12, 2018
MuleSoft Positioned as a Leader 3 Consecutive Times Read this complimentary copy of the 2018 Gartner Magic Quadrant for Full Lifecycle API Management, and find out why MuleSoft was named a Leader based on completeness of vision and the ability to execute. Read on to learn: Expert perspectives on API Management Critical analysis of key differentiators Latest developments in integration technology Industry benchmarks and trends Gartner Magic Quadrant for Full Life Cycle API Management, Paolo Malinverno, Mark O'Neill, 30 April 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of
Tags : 
     MuleSoft
By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : javelin, debix, customer service, customer experience, damage control, data breach, security breach
     Javelin Strategy & Research
By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This white paper sponsored by HP + Intel evaluates a solution that aims to enable the movement of data without physical limitations. Read now and see how this could enable agility and efficiency.
Tags : intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
     HP and Intel® Xeon® processor
By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security, it management
     Comcast Business
By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : wan optimization, enterprise wan
     VMware SD-WAN by VeloCloud
By: VMware SD-WAN by VeloCloud     Published Date: Aug 01, 2019
VMware named a Leader, positioned furthest for its Completeness of Vision. Read this complimentary copy of the 2018 Gartner Magic Quadrant for WAN Edge Infrastructure to find out more. *Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including and warranties of merchantability or fitness for a particular purpose.
Tags : 
     VMware SD-WAN by VeloCloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com