ims

Results 226 - 250 of 368Sort Results By: Published Date | Title | Company Name
By: Microsoft Azure     Published Date: Apr 10, 2018
Learn how to break down silos, reinvent productivity, and help your sales team achieve success by unifying transactional systems, social networking, and strong customer relationships. Download this free Nucleus report that says teams using the Microsoft Relationship Sales solution increased productivity 12-15 percent.** You’ll also learn how to: Empower your sellers with savvy insights that engage and delight customers. Scale the power of one-on-one relationship selling by unifying the sales experience. Offer your team tools to reinvent the way they sell and help transform your company’s bottom line. Use Microsoft Dynamics 365 for Sales along with LinkedIn Sales Navigator to help sellers identify future customers and suggest ways to engage with them. **Claims based on a 2017 study by Nucleus Research that analyzed more than 50 ROI case studies on CRM deployments from 2015 to 2017. Companies ranged in size from small and medium-sized businesses to large multinational enterprises. Re
Tags : 
     Microsoft Azure
By: ESV Digital     Published Date: Feb 10, 2015
The multiplication of marketing channels and devices concerning consumers has greatly increased the complexity faced by brands in their marketing efforts. This white paper aims to explain the issues, the principal attribution models used and the related challenges.
Tags : esv digital, algorithms, interactions, point of contact, nurturing, marketing data, marketing analytics
     ESV Digital
By: Crimson Hexagon     Published Date: Oct 11, 2016
This guide will help you learn the fundamentals of social media analytics and how you can apply it to your organization to make smarter, more data-backed decisions.
Tags : crimson hexagon, social media analytics, social media management, smm, social data, social media monitoring
     Crimson Hexagon
By: Qlik     Published Date: Aug 31, 2016
Qlik apps are used by teams in head-office functions like group finance or risk. Here's a list of the top 12 solutions that are the most popular, and offer the greatest business value.
Tags : qlik, finance solutions, risk, insurance, claims management, cvs, sales performance
     Qlik
By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
     CrowdStrike
By: Fitbit     Published Date: Mar 16, 2017
In a three-year retrospective study that analyzed health care claims and wearable device data from a self-insured employer, Springbuk looked at the potential impact of Fitbit technology as part of a wellness program. The analysis shows that connected health and fitness interventions can close the gap between the everyday actions that change health and drive outcomes for employee health and employer cost. Some of the key findings include: * Employees who opted into the Fitbit program demonstrated significant cost savings when compared to the control group. * Engaged users cost less than non-engaged users. * The opportunity for cost savings is potentially the highest with less active individuals.
Tags : 
     Fitbit
By: Fitbit     Published Date: Mar 21, 2017
Fear not, it is possible to prove the return on investment (ROI) of your wellness program! But don’t take our word for it. Springbuk, a health intelligence platform, recently evaluated the health care claims and wearable device data for a self-insured employer (and Fitbit customer) over a three-year period. View this webinar, Rod Reasen, CEO at Springbuk, walks you through their study and reveals how: - Employees who opted into the company’s wearable program cost less than their counterparts - Total costs for engaged wearable users dropped by 46% vs. 14% for non-engaged individuals - Cost reductions were highest with less active members – encouraging news for all employee populations
Tags : 
     Fitbit
By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : pinkslipbot, malware protection, malware, technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : pinkslipbot, malware protection, malware, technology
     McAfee
By: Epson     Published Date: Jan 10, 2019
Since the earliest days of the industry, insurance companies have faced a never-ending struggle: processing the voluminous amount of paperwork that underwriting, claims, and compliance require. But the days of enduring the burdens caused by mountains of paper can become a distant memory. By investing in new, proven methods of converting paper documents to readable digital formats, insurance organizations can fully automate document processing to accelerate workflows, minimize processing times and enable more efficient operations.
Tags : 
     Epson
By: Ephesoft     Published Date: Jan 18, 2018
Insurance companies are intensely data and document driven. Learn how intelligent document capture solutions can help all types of insurance offerings improve customer service, process claims faster and create streamlined, efficient and profitable business practices.
Tags : insurance, solutions, ephesoft, data, customer service, claims, business, optimization
     Ephesoft
By: Nimsoft     Published Date: Oct 24, 2011
This paper offers tips for offering self-service capabilities to customers, therefor improving customer service levels and satisfaction.
Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges
     Nimsoft
By: Nimsoft     Published Date: Oct 24, 2011
Join Forrester and Nimsoft for this one hour webcast and discover the most current recommendations for service delivery and management best practices.
Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges
     Nimsoft
By: Nimsoft     Published Date: Oct 24, 2011
This white paper outlines the key challenges of moving to SaaS-and how Nimsoft Service Desk helps address them
Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges
     Nimsoft
By: Nimsoft     Published Date: Oct 24, 2011
This white paper reveals the best monitoring practices to employ in virtualized environments.
Tags : nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges
     Nimsoft
By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : nimsoft, cloud service, delivery, models, monitor, monitoring, challenges
     Nimsoft
By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
     Jobvite
By: BlackBerry Cylance     Published Date: Sep 13, 2017
" Artificial intelligence and machine learning approaches provide radically new and improved endpoint protection. But not all companies' claims of using machine learning add up to a threat prevention strategy. Know the difference."
Tags : 
     BlackBerry Cylance
By: iCims     Published Date: Dec 01, 2015
There’s a new way to recruit! Learn 16 HR tips that address hiring and talent acquisition changes in 2016.
Tags : recruiting, human resources, social recruiting, social media recruiting, social recruiting software
     iCims
By: iCims     Published Date: Dec 01, 2015
Learn How Successful Recruiters Prepare for the Revolution in Talent Acquisition. View eBook Today!
Tags : recruiting, human resources, social recruiting, social media recruiting, social recruiting software
     iCims
By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
     IBM ILOG.
By: iCims     Published Date: Dec 28, 2016
That’s why in this eBook, we take a look at 17 ways companies can adapt to a changing talent acquisition landscape, to ensure they can better grow their workforce today, and in the years to come.
Tags : 
     iCims
By: iCims     Published Date: Dec 28, 2016
f there’s one thing we know about the world of talent acquisition, it’s that it’s always evolving. Staying ahead of the latest trends can give employers the edge they need to hire smarter in the year to come.
Tags : 
     iCims
By: iCims     Published Date: Dec 28, 2016
Remember when a recruiter’s role was defined by identifying, screening, and hiring qualified professionals?
Tags : 
     iCims
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com