HIT Consultant Insightful coverage of healthcare innovation
 

indicators

Results 1 - 25 of 89Sort Results By: Published Date | Title | Company Name
Published By: ACTEK, Inc.     Published Date: Aug 30, 2007
Download this very brief guide now and reflect on the 9 Indicators. If you answer "no" to two or more of the questions listed within, there is undoubtedly sufficient ROI to strongly consider replacing your current incentive compensation system.
Tags : 
incentive compensation, incentive, sales, salesforce, salesforce management, sales manager, sales management, bonus
    
ACTEK, Inc.
Published By: Adobe     Published Date: Oct 30, 2014
The Best of the Best Benchmark report compares the overall average versus websites in the top 20% on 6 key performance indicators across six regions — United Kingdom, France, Germany, BeNeLux, Nordics and United States.
Tags : 
measuring your online presence, best of the best benchmark report, evaluating marketing techniques, increasing marketing trending
    
Adobe
Published By: Adobe     Published Date: Dec 21, 2015
Productivity and efficiency have been the traditional indicators of business health and performance. But what about Creativity? Does it lead to more business success?
Tags : 
adobe, business results, creativity, productivity, efficiency
    
Adobe
Published By: Adobe     Published Date: Apr 15, 2016
If your company is a car, data can change it form a sedan to a Porsche. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Demonstrating Impact: Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave your competition in the dust. Download our guide to learn how data-driven marketing can help you: • Define the right goals and performance indicators • Make better business decisions faster • Deliver personalized and compelling experiences • Spend budget more profitably • Enhance employee efficiency Download our guide to transform your business.
Tags : 
adobe, data driven marketing, marketing
    
Adobe
Published By: AdRoll     Published Date: Jul 11, 2017
AdRoll surveyed 350 marketers across Australia, New Zealand and Singapore this year to dive into how they're thinking about the latest performance strategies across every stage of the marketing funnel. The survey explored: • The challenges marketers are tackling when creating mobile campaigns • The attribution models marketers are moving toward • The key performance indicators marketers are using to measuring to determine the success of their campaigns • The channels marketers are using to run programmatic advertising • And more! See how your campaigns compare to those of 350 other marketers.
Tags : 
marketing, programmatic advertising, performance marketing, adaptation
    
AdRoll
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: Aquire     Published Date: Oct 07, 2011
Gain a clear understanding of what workforce analytics are and how they are integral for strategic planning to support your company's overall strategies from the creators of Human Resource Executive's 2010 Top Product, Aquire InSight.
Tags : 
workforce analytics, aquire, aquire insight, workforce analytics software, hr reports, hr metrics, hr trends, hr dashboard
    
Aquire
Published By: Ariba     Published Date: Mar 30, 2011
Read Forrester's 70-criteria evaluation of eProcurement solutions, we found that Ariba and Basware led the pack because of their superior user experience and wider supplier enablement capability.
Tags : 
ariba, eprocurement, basware, key performance indicators, kpis, supplier relationship management, srm, erp
    
Ariba
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
The Tolly Group’s hands-on evaluation of BLADE’s RackSwitch G8000 demonstrates that the device offers non-blocking 1/10G switching, lower latency and less energy consumption than the Cisco 4948-10GE. These are very important productivity indicators for the top-of-the-rack switches deployed in the data center where latency-sensitive applications such as clusters and financial applications set strict requirements.
Tags : 
rackswitch, blade network technologies, non-blocking 1/10g switching, cisco 948-10ge, top-of-the-rack switches
    
BLADE Network Technologies
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile, security, devices, users, bluecoat
    
Blue Coat Systems
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Broadsoft     Published Date: May 25, 2017
There is a lot of industry buzz about Key Performance Indicators (KPIs), but most contact centers currently focus on only one or two core KPIs, such as “Service Level,” and are only equipped to optimize these KPIs locally. Few contact centers have the tools to manage performance globally.
Tags : 
    
Broadsoft
Published By: Bronto     Published Date: Jul 16, 2012
Welcome to Part 2 of our series where we explore the many opportunities yielded by integrating Recency, Frequency, Monetary(RFM) analysis into your email marketing program in order to lift your pivotal Key Performance Indicators (KPIs). Download Part 2 to learn more.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer
    
Bronto
Published By: Capita     Published Date: Jun 25, 2019
Introducing ECG: Enterprise Connectivity Grading. The key metrics of organisational well-being have changed. While indicators like strategy, sales, margins, and profitability remain crucial, these now hinge on other vital factors. The organisation’s ability to leverage key assets like its people and data. Its agility, mobility, and adaptability. Its capacity to transform, evolve, and grow over time. And these factors in turn are now fundamentally contingent on something else. Connectivity. Download the eBook and learn more>>
Tags : 
    
Capita
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate
    
CDW Symantec
Published By: Cisco     Published Date: Dec 21, 2016
This study showed that as companies adopt cloud strategies for sourcing and building IT services, they are both expecting and achieving significant gains in business key performance indicators (KPIs) including revenue growth, strategic IT budget allocation, IT costs, quicker time to provision, and increased ability to meet SLAs. Further, our study showed that as businesses increased their orientation to cloud, these KPI benefits accelerated. IDC has identified five stages of cloud maturity: ad hoc, opportunistic, repeatable, managed, and optimized (in increasing maturity), and while there are immediate benefits from moving even from ad hoc to opportunistic, the benefits accrue and grow as you move up the adoption curve. Organizations studied are realizing $1.6 million in additional revenue and $1.2 million in reduced costs per cloud application.
Tags : 
    
Cisco
Published By: Citrix Online     Published Date: Jul 01, 2010
This new SPI white paper provides guidance on developing an effective strategy for monitoring, measuring and managing your professional services organization.
Tags : 
citrix online tech, monitoring, measurement, key performance indicators, kpi, tco
    
Citrix Online
Published By: Clarus Systems     Published Date: Mar 18, 2008
Accessible through a web-based, interactive dashboard, the latest version of the ClarusIPC Plus+ solution integrates performance management capabilities that create real-world "What-if" scenarios to predict capacity issues before they have a chance to impact end users. By monitoring KPI's such as server health, gateway capacity, media resources and device registration, you consistently maintain the ability to estimate future bandwidth needs.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems
Published By: ConnectWise     Published Date: Aug 22, 2019
The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed, educated decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of some of the most important KPIs used by top MSPs. We’ll focus on two major areas – finance and service – to help you better understand how to use KPIs as an essential tool for building a more sustainable business.
Tags : 
    
ConnectWise
Published By: Crowdcast     Published Date: Apr 30, 2010
The Aberdeen Group reviews SAP's partnership with Crowdcast and how Crowdcast's Collective Intelligence Platform is used to monitor key risk indicators, helping enterprises course correct as events arise that may impact success.
Tags : 
crowdcast, cpg, key risk, businessobjects, grc, platforms, collective intelligence, packaging
    
Crowdcast
Published By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : 
cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data
    
Cyveillance
Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention
    
Damballa
Published By: Darktrace     Published Date: Apr 02, 2019
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks – before damage is done.
Tags : 
    
Darktrace
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.