HIT Consultant Insightful coverage of healthcare innovation
 

history

Results 101 - 125 of 125Sort Results By: Published Date | Title | Company Name
Published By: AdRoll     Published Date: Jul 11, 2017
Nothing is more top of mind for marketers than attribution. It’s a complex topic, and there are lots of questions. Should you measure only the first click, or the last click? Should you also measure views? Should you combine view measurement with click measurement? How long should you wait to give credit to user activity? In this whitepaper, we examine the history of attribution models and dive deep into AdRoll platform data, third-party research, and advertiser survey data to make the case for marketers to adopt a blended attribution model, one that combines both ad views and clicks. Attribution is critical to marketing success because nothing has a bigger influence on evaluating results than how you measure the impact of your advertising. And in the digital paradigm, almost everything is measurable. When we surveyed our customers, we heard this point loud and clear. Of the 1,050 marketers we spoke to in our 2016 State of the Industry Report, 84% believe attribution is critical or ver
Tags : 
attribution, adroll, performance marketing, advertising
    
AdRoll
Published By: IAB     Published Date: Jan 24, 2007
This document reviews the definition of deliverability, its history, and the impact on marketers. The current causes of how to measure and monitor and how to resolve deliverability issues are also addressed.
Tags : 
email marketing, email deliverability, deliverability
    
IAB
Published By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : 
risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
    
PassGo
Published By: SilverStorm Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0
    
SilverStorm Technologies
Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca
Published By: Customer Chemistry     Published Date: Nov 14, 2006
As part of the ongoing effort to differentiate products and services, best-in-breed organizations are now using a tool called Customer Lifetime Value (CLV). CLV is “a marketing metric that projects the value of a customer over the entire history of that customer's relationship with a company.”
Tags : 
marketing, customer lifetime, customer research, customer intelligence, customer relationship management, crm, customer value, customer chemistry
    
Customer Chemistry
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
There's a good reason athletes in contact sports wear protective pads. History of the game has proven where injuries are most likely to occur, hence the placement of the pads.
Tags : 
product management, product development, product lifecycle management, zigzag
    
ZIGZAG Marketing, Inc.
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
There is simply no easier way to make compact, professional quality patches for your software and electronic content. Visual Patch 2.0's point-and-click design workflow takes the difficulty out of building even complex full-history patches.
Tags : 
sofware development, patch, updates, binary patches, indigo rose
    
Indigo Rose Corporation
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
An introductory view of Visual Patch 2.0 from the ground up. Learn all about Visual Patch 2.0 and see everything it can do. Create secure full-history or binary patches quickly and easily!
Tags : 
software development, software patch, patches, binary patches, software updates, indigo rose
    
Indigo Rose Corporation
Published By: Bronto     Published Date: Jan 03, 2013
Shar Music targeted personalized offers based on past order history, preferred product category and towards top customers. Using this targeted communication, response and conversion rates increased.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans.
Tags : 
messagelabs, symantec hosted services, malware, trojan attack, email guard, spam
    
Symantec.cloud
Published By: Touch International     Published Date: Mar 07, 2011
Putting the "Touch" in Multi-Touch: An in-depth look at the future of interactivity, is a must-read for anyone looking to understand how multi-touch technology works, examining the history and future of multi-touch.
Tags : 
multi-touch, touch, touch screen, touch screens, multi-touch screen, multi-touch display, touch interface, touch technologies, multi-touch technologies, multi-touch systems, multi-touch sensing technology, multi-touch technologies, multi-touch sensing, projected capacitive, multi-touch analog resistive, multi-touch gestures
    
Touch International
Published By: Thawte     Published Date: Dec 29, 2015
This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Tags : 
cryptography, encryption, security
    
Thawte
Published By: IBM     Published Date: Nov 05, 2013
Providing a superior experience for citizens and constituents is not easy, and gone are the days when problematic customer interactions can be smoothed over by empathetic service representatives. In an omni-channel world, the number of citizen touchpoints is not only increasing, but is increasingly automated, and governments will not get many chances to take the steps that are required to make things right. Unlike at any other time in history, the quality of your operations will shine through, in virtually every interaction with the citizen. A Smarter Process approach helps you to reinvent business operations in the era of the citizen.
Tags : 
government, smarter process approach, agility, business process management, bpm, cities, efficient government
    
IBM
Published By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : 
file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs, file locking, version history, file integrity, network traffic, security, centralized backup, centralized management
    
Globalscape
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AppDynamics     Published Date: Feb 08, 2018
This eBook discusses the history of application performance testing, and with that backdrop, offers advice on combining performance testing and Application Performance Monitoring (APM) in the AWS cloud.
Tags : 
    
AppDynamics
Published By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: • Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. • First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. • A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features.
Tags : 
mimecast, virtual event, email archiving, email solutions, cloud archiving
    
Mimecast
Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
From its beginnings in the early 1990s to its present state, enterprise risk management (ERM) has experienced a significant transformation. Over the past three decades, ERM has evolved in response to a number of macroeconomic events, as well as multiple business and regulatory changes. We live in a new world that is now more volatile and uncertain than ever before. The speed of change and the velocity of risk have increased significantly. Download this white paper from ERM pioneer James Lam to learn how organizations can successfully evolve their ERM function. You'll explore the history of ERM and how events have shaped the current function in organizations, the next phase in its evolution of performance-based continuous ERM, and its seven key attributes.
Tags : 
risk management, best practices, evolution
    
IBM
Published By: Datastax     Published Date: Aug 03, 2018
eCommerce is a whole new ball game today. Customers want quick, instantly responsive applications that adapt to their personal preferences and buying history, and if the application lags for just a moment, they click away at the expense of your bottom line. Read this white paper to learn what today’s ecommerce applications need at the data layer to thrive in the Right-Now Economy and the specific features that make DataStax Enterprise the best choice for your ecommerce apps.
Tags : 
    
Datastax
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities, solution, content, systems, onbase, hyland, validation
    
OnBase by Hyland
Published By: DocuSign UK     Published Date: Aug 08, 2018
"The General Data Protection Regulation (GDPR) is one example of the evolving regulatory landscape in the digital age. Since the European Union (EU) adopted the regulation in 2016, DocuSign has been investing to be compliant across its entire business, building upon our foundation and history of commitment to privacy. The conception of the GDPR undoubtedly introduced a number of compliance challenges for businesses to address around data privacy and protection. It also presented an opportunity for businesses to build trust with their stakeholders by reconnecting with the people they serve. This eBook details DocuSign’s approach to meeting GDPR’s obligations that went into effect on 25th May 2018, for companies conducting business in the EU, and the features and benefits that can be gained from using the DocuSign solution to fulfil certain areas of the GDPR."
Tags : 
    
DocuSign UK
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse.
Tags : 
    
Group M_IBM Q1'18
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Encryption, if properly deployed and managed, is one of the most powerful tools that organizations can use to avoid costly and embarrassing data breaches. Yet organizations struggle with the complexity associated with the technology that often stems from a history of siloed investments of point solutions designed to largely address pools of regulated data associated with a compliance mandate.
Tags : 
    
Group M_IBM Q418
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.