HIT Consultant Insightful coverage of healthcare innovation
 

response

Results 351 - 375 of 560Sort Results By: Published Date | Title | Company Name
Published By: AcquireWeb     Published Date: Apr 07, 2008
This opinion piece, published by DM News in November 2007, addresses a common but less talked about problem with email marketing – over-mailing to positively effect otherwise mediocre results; which is likely the result of an acquisition email provider using a compiled response file, and guaranteeing high open and click rates in addition to a positive ROI. This article provides insight on what the marketer, broker or agency can do to ensure they are maximizing the ROI from a given campaign, while disincentivizing over-sending behavior.
Tags : 
email, conversion, conversion testing, email marketing, frequency, overdelivery, over-delivery, acquireweb, email marketing campaign, email campaign, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing
    
AcquireWeb
Published By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : 
acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: SubscriberMail     Published Date: Dec 12, 2008
The benefits of addressing the image suppression issue are significant. A recent controlled study by SubscriberMail demonstrated the response improvements gained by optimizing an email message to have impact even when images are not displayed. In this study, an email message that was not optimized for image suppression was sent to a test panel of approximately 50,000 subscribers. Simultaneously, a panel of similar makeup received a version of the same message optimized for non-graphical display. Compared to the non-optimized version, the optimized version saw an 87 percent increase in clicks.
Tags : 
subscribermail, image blocking, image suppression
    
SubscriberMail
Published By: Quantivo Corporation     Published Date: Sep 01, 2009
Watch this webinar to learn how top companies are re-energizing their B2B marketing with customer behavior analytics. Take advantage of your Web, CRM, Support and other touch points to identify customer actions that signal a future purchase and which marketing programs will help speed the process.
Tags : 
quantivo, customer behavior, crm, behavior, analytics, lead response, sales leads, cycle times, close rates, crm, support, web, b2b
    
Quantivo Corporation
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Consumer reviews can have an impact on sales, but did you know that negative reviews can actually improve purchase intent? The linchpin: How brands respond. Read new research about the power of responding to consumers.
Tags : 
consumer-centric, consumer engagement, brand messaging, branding, brand response, consumer conversations
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Apr 30, 2014
Negative consumer feedback creates great opportunities for brands to respond. In fact, consumers who read helpful brand responses to reviews are 186% more likely to make a purchase. Hear first-hand how brands respond in this recording.
Tags : 
consumer-centricity, consumer engagement, brand messaging, branding, brand response
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
Negative consumer feedback creates great opportunities for brands to respond. In fact, consumers who read helpful brand responses to reviews are 186% more likely to make a purchase. Hear first-hand how brands respond in this recording.
Tags : 
bazaarvoice, webinar, negative reviews, purchase intent, customer feedback, brands response, customer conversations, constructive responses
    
Bazaarvoice
Published By: IBM     Published Date: Oct 01, 2012
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment.
Tags : 
intranet, web experiences, customer experience, web content management, content delivery
    
IBM
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
Published By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : 
data protection, threats, security landscape, shifting data, data maturity
    
Lumension
Published By: Intercom     Published Date: Apr 05, 2018
In Sales, timing is everything. You can have the world’s most talented sales team and the greatest product but still lose to a competitor.
Tags : 
    
Intercom
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey
    
CloudEndure
Published By: IBM     Published Date: Mar 28, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, kenexa talent insights, workforce science, talent insights
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology
    
IBM
Published By: SAP     Published Date: Apr 13, 2011
Find out what your company needs to do to maximize opportunities and limit risks in response to current and future energy emissions policies. Learn about policies in force in regions and countries around the world, and discover strategies to manage emissions to help benefit your organization.
Tags : 
climate policy, energy policy, sap, global greenhouse gas emissions, christopher l. weber, h. scott matthews, andreas vogel, supply chain, ghg, ipcc
    
SAP
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: Qualys     Published Date: Jan 08, 2015
The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Council on CyberSecurity, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.
Tags : 
critical security controls, csc adoption, enterprise information assurance, cybersecurity
    
Qualys
Published By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : 
blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Act-On     Published Date: Nov 12, 2008
Discover how to get maximum response from your next e-mail Webinar invitation. Learn how to make your event stand out from the crowd, and how to avoid the common mistakes that doom most Webinars to mediocrity.
Tags : 
act-on, webinars, marketing, campaigns, marketing automation, lead generation, lead management, email, webforms, webex.
    
Act-On
Published By: Genius Inc     Published Date: Apr 28, 2010
This event will give you what you need to: •Evaluate your social media needs •Set the ground rules for your organization •Establish Goals •Match response and engagement to buyer interest •Measure Success •Get started and be successful with Social Marketing
Tags : 
genius, webinar, social marketing, social media, networking, response, engagement, sales, buyer interest
    
Genius Inc
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Sephora is a leading retail beauty chain selling more than 8,000 unique products and 250 brands of perfume and premium cosmetics.  A fully owned subsidiary of the world’s leading luxury products company, LVMH Moët Hennessy Louis Vuitton, Sephora operates 500+ stores in 14 countries worldwide, with an expanding base of more than 125 stores across North America where it is the largest retailer of perfume and cosmetics.
Tags : 
neolane, sephora, direct mail campaigns, increase response rates, reduce campaign analysis time, spss integration, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.