asure

Results 201 - 225 of 971Sort Results By: Published Date | Title | Company Name
Published By: Kaseya     Published Date: May 13, 2015
Healthcare systems are inherently distributed across large campus environments, making regular IT systems management complex and time consuming. The risks of irregular maintenance and non-compliance of IT and security policies are not only measured in dollars lost but in lives saved.
Tags : 
    
Kaseya
Published By: Workforce Software     Published Date: Feb 02, 2015
Find out how other organizations design, execute, and measure workforce management programs.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk
    
Workforce Software
Published By: Workforce Software     Published Date: Dec 16, 2015
Do you want to know how other organizations design, execute, and measure workforce management programs? Hereís your chance.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, cloud, enterprise
    
Workforce Software
Published By: SAP     Published Date: Nov 04, 2015
Download this executive summary of the 2015 Customer Experience Risk Study and learn: -Why at-risk customers often account for over 10% of potential revenue -How retailers miss over 80% of problem occurrences -How to take a customer-value lens to understand problematic experiences -How to measure on impact, as the frequency of issues can be deceiving
Tags : 
customer experience, sap, at-risk customers, potential revenue, problem occurences, customer-value, measuring on impact, emerging marketing, crm & customer care, marketing research
    
SAP
Published By: Davis & Company     Published Date: May 11, 2015
Overcome your fear of employee communication measurement by learning to measure communications more systematically, consistently and easily.
Tags : 
employee communication measurement, efficiency
    
Davis & Company
Published By: Mitel     Published Date: Dec 19, 2016
As a professional with influence over the customer experience your business provides to your customers, you likely have a sense of which organizations are getting it right, whether they're your direct competitors or sources of inspiration in another line of business. While you can try to mimic, replicate or establish your own benchmarks to measure against based on these success stories, there's nothing more valuable than hearing how it's done directly from the pros. Check out our free e-booklet to learn from six companies that transformed their digital customer experience and saw measurable results in customer satisfaction, operational costs, employee productivity, and more.
Tags : 
customer experience, sms, email, web chat, social media, mobile
    
Mitel
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
Many organizations report the need to upgrade their core HR systems within the next three years. How will organizations measure the return on investment (ROI) of their new HR solution? Learn how to measure ROI, taking into account improvements like an agile, more productive workforce, increased engagement, greater data insight and cost savings.
Tags : 
    
Oracle HCM Cloud
Published By: Carbonite     Published Date: Oct 10, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratioóthe size of the original data measured against the size of the data store after redundancies are removed.
Tags : 
    
Carbonite
Published By: Google Analytics 360 Suite     Published Date: Jul 28, 2017
Todayís marketing leaders need sophisticated tools to turn data into cross-channel insights that improve performance. In a new report, Gartner compares 11 digital marketing analytics solutions across five key areas: data integration, exploration, advanced models, platform integrations, and measurement. Selecting the best solution for your team requires thoughtful analysis. How will you determine the best fit? Gartnerís Magic Quadrant can help.
Tags : 
    
Google Analytics 360 Suite
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organizationís security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Groove     Published Date: May 16, 2018
Account based sales (ABS) has generated a lot of buzz lately, but itís more than just a passing trend. In fact, many enterprise sales teams have been doing account based sales for quite a while. Whether this is the first time you have encountered the idea of ABS or you have heard about it before, this e-book will equip you with the basics so you can decide whether ABS is right for your company, outline your own ABS strategy, and optimize for the best results possible. Weíll cover: An explanation of account based sales Key benefits of adopting an ABS strategy How to get started and implement a successful ABS strategy Best practices and KPIs to optimize and measure your strategy Additional resources to help you plan and execute your strategy
Tags : 
    
Groove
Published By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides itís time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
    
PwC
Published By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : 
devops, devops tools, continuous delivery, devops methodology
    
Splunk
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organizationís expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who theyíre targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Published By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brandís social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. Itís led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that werenít built for commerce. Thatís made it increasingly complex for brands hoping to meet customersí needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : 
visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
    
Curalate
Published By: Taleo     Published Date: Nov 11, 2010
Talent Intelligence: Using Measurement to Better Manage the Workforce and HR: How can you better understand and engage your people for higher business performance? Talent intelligence aligns workforce data with business information to drive better decisions.
Tags : 
taleo, intelligence, workforce, engagement, knowledge infusion
    
Taleo
Published By: Taleo     Published Date: Nov 11, 2010
Check out the latest Total Picture Radio interview with Ronald M. Katz. Discussion includes how top performing organizations are using talent analytics to measure and manage individual performance against goals.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment, employee performance, quality of hire
    
Taleo
Published By: IBM Marketing Cloud     Published Date: Sep 26, 2016
Download this Benchmark Study and discover how you measure up across 25 open, click-through, list churn and mobile metrics.
Tags : 
marketing metrics, marketing, mobile, mobile marketing, mobile metrics, email marketing services/software
    
IBM Marketing Cloud
Published By: Pure Storage     Published Date: Jul 18, 2017
This IDC study represents a vendor assessment model called the IDC MarketScape. It's a quantitative and qualitative assessment of the characteristics that assess vendors' current and future success in the AFA market segment and provide a measure of the vendors' ascendancy to become a Leader or maintain a leadership position. IDC MarketScape assessments are particularly helpful in emerging markets that are often fragmented, have several players, and lack clear leaders.
Tags : 
flash performance, latencies, stripped data, storage techniques, technology efficiency, vendors, api support, odx, usage statistics
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 18, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: Infor     Published Date: Mar 03, 2017
It is the best of times and the worst of times for elite finance professionals in mid- to largesized organizations. With demands for more information, faster, going nowhere but up, and finance departments playing an increasingly strategic role in determining business direction, CFOs, Controllers and their staffs are finding themselves intellectually stimulated and exhausted in equal measure.
Tags : 
finance, cfo, finance process, data analysis, risk management
    
Infor
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.