HIT Consultant Insightful coverage of healthcare innovation
 

frequency

Results 26 - 50 of 102Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: Urban Airship     Published Date: Oct 18, 2017
Push notifications for mobile and web that boost customer engagement & retention. Our data study of 63 million new app users shows that when brands send high value push notifications more frequently (sometimes more than one a day!) users are more likely to engage and keep their app. So what kinds of push notifications should you be sending? Download this eBook for 50+ examples you can use to increase the frequency of your notifications (web or app) — and reap the bottom line benefits.
Tags : 
    
Urban Airship
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Retailers who can identify their customers and deliver hyperpersonalized engagement on any channel are the ones thriving in this new age of retail. As the old model of inventory-led retail becomes obsolete, forward-thinking marketers deliver a new generation of shopping experiences with a common focus: the individual consumer. In our Personalization Handbook for Retail Marketers, we’ll provide a toolset of proven strategies and technologies to help marketers leverage personalization for longterm wins such as increased customer loyalty, spending frequency and lifetime value. Starting things off, we’ll discuss why hyper-personalization is the only constant in today’s rapidly changing retail landscape.
Tags : 
    
Selligent Marketing Cloud
Published By: MessageLabs     Published Date: Sep 25, 2008
A close look at the data provides a clear picture of how spammers vary their tactics to overwhelm traditional corporate email defenses, through changes in duration, frequency and intensity among others. This whitepaper will help you understand these threats to your business, and how MessageLabs provides a unique solution.
Tags : 
messagelabs, spam, data analyst, traffic, trends, anti-spam
    
MessageLabs
Published By: Progress     Published Date: Jan 22, 2019
The customer experience is incredibly important to business success and is often tied to customer engagement, retention rates, revenue, purchase frequency and overall loyalty. Today, the customer journey is incredibly complex, with everything from geographic location to data quality influencing the customer experience. As a result, brands may not be making the most of their customer experiences.
Tags : 
    
Progress
Published By: SessionM     Published Date: Jan 24, 2018
Learn the best strategies to stand out from your competition and increase purchase frequency, recency, spend and customer lifetime value.
Tags : 
customer engagement, unified customer profile, customer data platform, data orchestration, customer data activation, machine learning, data integration, personalization
    
SessionM
Published By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
Published By: Silverpop     Published Date: Sep 19, 2011
With more people trying to squeeze more activities into a finite amount of time, it's no wonder that people say "time is money." And for marketers with less margin for error than ever, timing is literally money. So how do you deliver the right message at the right time and ensure your revenues don't melt away faster than a clock in a Dali painting?
Tags : 
silverpop, email, marketing
    
Silverpop
Published By: Websense     Published Date: Aug 23, 2012
"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.
Tags : 
phishing, web security, email security, phishing attacks
    
Websense
Published By: Glint     Published Date: Feb 16, 2018
Leaders care deeply about employee engagement. Most organizations measure it. Why aren't they equipped to address it? How precise is your employee engagement barometer? Use this guide to gauge your organization's effectiveness in measuring and improving employee engagement by focusing on four main categories: • Are you measuring the right things at the right frequency? • Did you get actionable insights? • Are insights delivered to the right people--managers (not just HR leaders and the CEO) • Are people equipped to act quickly?
Tags : 
employee engagement, hr metrics, employee engagement survey, employee engagement strategies, employee engagement strategy
    
Glint
Published By: BMC ASEAN     Published Date: Dec 18, 2018
400+ IT professionals reveal what’s next for workload automation How are today’s leading companies using workload automation to drive their most important IT initiatives? Find out in this detailed report summary from analyst firm Enterprise Management Associates (EMA). You’ll learn how the role of workload automation is evolving, including: The rise of predictive analytics in WLA Surprising stats on the frequency and ease of migration How big data and cloud impact WLA The use of containers and micro services architectures Workload automation is changing fast. Keep up with the latest analyst research – download the report.
Tags : 
    
BMC ASEAN
Published By: DataCore     Published Date: Apr 23, 2019
Innovations in data storage technology come with surprising frequency as competitors constantly leapfrog each other. That’s both good and bad. Good because they promise to solve pressing performance, reliability and cost problems. Bad because they often render perfectly good equipment prematurely obsolete.
Tags : 
storage virtualization, disk pooling, storage pooling, storage performance, storage refresh, storage consolidation, storage array
    
DataCore
Published By: DataCore     Published Date: Apr 23, 2019
The emphasis on fast flash technology concentrates much attention on hot, frequently accessed data. However, budget pressures preclude consuming such premium-priced capacity when the access frequency diminishes. Yet many organizations do just that, unable to migrate effectively to lower cost secondary storage on a regular basis. In this white paper, explore: • How the relative proportion of hot, warm, and cooler data changes over time • New machine learning (ML) techniques that sense the cooling temperature of data throughout its half-life • The role of artificial intelligence (AI) in migrating data to the most cost-effective tier.
Tags : 
storage tiering, auto tiering, all-flash array, ssd, software defined storage, hyperconverged, data migration, storage migration
    
DataCore
Published By: IBM     Published Date: Oct 02, 2015
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
ibm, release management, business needs, market trends, customer demands, deploy application, best practices
    
IBM
Published By: Glint     Published Date: Aug 10, 2016
Leaders care deeply about employee engagement. Most organizations measure it, why aren’t they equipped to address it? Download our guide to gauge your organization’s effectiveness in measuring and improving employee engagement by focusing on four main categories: • Are you measuring the right things at the right frequency? • Did you get actionable insights? • Are insights delivered to the right people—managers, not just HR leaders and the CEO • Are people equipped to act quickly? CTA (20) Download eBook
Tags : 
employee engagement, human resource, organization, best practices, business management
    
Glint
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication
    
Entrust Datacard
Published By: PC Mall     Published Date: Mar 03, 2012
Many service providers are turning to Canon for their own internal needs with increasing frequency. Such is the case with ScerIS, a technology leader in providing business process optimization through software development and consulting and services.
Tags : 
canon, optimization, scanning, scan, productivity, sceris, optimization, consulting
    
PC Mall
Published By: LogMeIn     Published Date: Jan 15, 2014
Today’s consumer is almost ambivalent when it comes to customer service channels; this generation of shoppers simply wants service their way. Take a look at the 2013 survey of internet shoppers.
Tags : 
logmein, live chat, e-tailing, multichannel communications, live chat best practices, channel usage, channel satisfaction, chat frequency
    
LogMeIn
Published By: Cisco     Published Date: May 15, 2015
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable.
Tags : 
cloud computing, erp, productivity, applications, efficiency, videoconference, enterprise, cisco
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable.
Tags : 
    
Cisco
Published By: LogRhythm     Published Date: Jun 19, 2018
As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.
Tags : 
cybersecurity, survey, security, leaders, data, industry
    
LogRhythm
Published By: Zebra Technologies     Published Date: May 02, 2018
Near-perfect inventory visibility is critical to transforming the customer experience and competing in the retail revolution. Yet inventory accuracy across retail sectors hovers at around 60%. That shortfall causes retailers to lose out on potential sales and puts customer loyalty at risk.How do retailers address this issue? RFID—or radio frequency identification—is 10 times more efficient at cycle counting and can increase inventory accuracy across the supply chain by up to 99.5%, enabling retailers to truly compete in the highly competitive omnichannel world. Launch a successful RFID technology pilot program in your retail operation with our free How-to Guide: Five Steps to Piloting RFID for Unprecedented Inventory Visibility. This guide takes you from Step 1 (a KPI checklist) to Step 5 (execution and monitoring), so you can launch a pilot program and effectively measure its ROI before moving to full deployment. Download the free Guide today.
Tags : 
rfid, program, inventory, guide, risk, customer
    
Zebra Technologies
Published By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Microsoft     Published Date: Jul 20, 2018
Kevin Ashton founded the Auto-ID Center at the Massachusetts Institute of Technology, and has done pioneering work in radio-frequency identification and sensor technology. Ashton is known for coining the term “the Internet of Things” to describe a system where the Internet is connected to the physical world via ubiquitous sensors. In 2015, he spoke at a European customer service conference and noted that field service management is the first industry being transformed by IoT. Some people in the industry have noted that the entire IoT concept came from trying to solve field service problems in 1999. IoT’s origin story lies in field service management. Clearly, field service management and IoT are deeply intertwined. But how are the changes being implemented? And how can you benefit from them?
Tags : 
    
Microsoft
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.