metrics

Results 451 - 475 of 653Sort Results By: Published Date | Title | Company Name
Published By: Greenhouse     Published Date: Jan 25, 2017
The search for new technology always starts with a big questions: Where do you want it to take you?
Tags : 
recruiting tips, recruiting software, recruiting strategy, applicant tracking, talent acquisition, recruiting metrics, recruiting data, talent metrics, candidate experience, candidate sourcing, candidate management, talent strategy, recruiting, recruitment
    
Greenhouse
Published By: Greenhouse     Published Date: Jan 25, 2017
The 10 steps you need to take to build an effective partnership with hiring managers. Download now.
Tags : 
recruiting tips, recruiting software, recruiting strategy, applicant tracking, talent acquisition, recruiting metrics, recruiting data, talent metrics, candidate experience, candidate sourcing, candidate management, talent strategy, recruiting, recruitment
    
Greenhouse
Published By: Greenhouse     Published Date: Jan 25, 2017
The Structured Hiring method ensures an effective and unbiased recruiting process. Get your free guide today.
Tags : 
recruiting tips, recruiting software, recruiting strategy, applicant tracking, talent acquisition, recruiting metrics, recruiting data, talent metrics, candidate experience, candidate sourcing, candidate management, talent strategy, recruiting, recruitment
    
Greenhouse
Published By: Citrix Online     Published Date: Jul 01, 2010
This new ServiceXRG white paper explores the importance of quantifying the impact of support on your business.
Tags : 
citrix online tech, monitoring, measurement, servicexrg, tco, business metrics, performance benchmarking
    
Citrix Online
Published By: Citrix Online     Published Date: Aug 31, 2010
Use your value proposition in your phone calls, emails, voicemails and presentations to help customers understand why it's worth their time to meet with you.
Tags : 
citrix online marketing, value proposition generator, metrics, web marketing, document management, sales training
    
Citrix Online
Published By: IBM     Published Date: May 19, 2015
An analytics-based marketing platform can help marketers tackle the opportunities and challenges of a data and consumer-driven marketplace.
Tags : 
marketing analytics, analytics-based marketing platform, kpis, best practices, metrics, return on marketing investment, romi
    
IBM
Published By: IBM     Published Date: Jul 27, 2015
Read this whitepaper to look at why network service quality matters to customer loyalty and CSP attitudes to improve it
Tags : 
customer loyalty, network service quality, communications service providers, service quality metrics, operational performance, customer experience management, cem, cem solution, cem architecture
    
IBM
Published By: IBM     Published Date: Jan 20, 2016
In the face of an overabundance of numbers, knowing which metrics are most important can be a real challenge for HR leaders and hiring managers.
Tags : 
ibm, hiring, metrics
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
"Increasingly, brands are looking to differentiate based on an exceptional customer experience. The key to improving the customer experience is being able to effectively measure what’s working and what you need to improve. IBM host a webinar presenting tips on how to measure the customer experience for your brand and how to use that data to build better journeys. Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: • Best practices to measure the quality of digital customer experiences • Guidance on the kinds of tools to use to capture the right CX metrics • Tips for integrating metrics, including the role of customer journeys • Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, marketing, customer experience, customer insight, forrester, digital experience
    
IBM
Published By: IBM     Published Date: Aug 17, 2016
The webinar will provide attendees with: - Best practices to measure the quality of digital customer experiences - Guidance on the kinds of tools to use to capture the right CX metrics - Tips for integrating metrics, including the role of customer journeys - Techniques to drive action and improve digital experiences"
Tags : 
ibm, customer experience, commerce, digital, digital customer experiences, cx metrics
    
IBM
Published By: IBM     Published Date: Oct 12, 2016
Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: - Best practices to measure the quality of digital customer experiences - Guidance on the kinds of tools to use to capture the right CX metrics - Tips for integrating metrics, including the role of customer journeys - Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, customer experience, forrester research
    
IBM
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization introduces new challenges for managing your data center. Applications now compete for shared resources such as storage, CPU cycles and memory, often causing performance bottlenecks and unhappy customers. This paper details 20 metrics that indicate when capacity issues are occurring and recommends a corresponding tool that will analyze the data and resolve your VM performance issues. Read the White Paper "
Tags : 
vmware, metrics, virtualization
    
Dell
Published By: IBM     Published Date: Mar 18, 2015
Download this leading-edge research today to learn about the critical business and performance metrics that can be used to assist an organization in choosing the optimal security platform.
Tags : 
security, platform security, cyber criminal, security software, security appliances, cloud architecture, electronic exposure, business models, process security
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, security, qradar, siem, network traffic anomalies
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
How open source web platforms can open your organization to attack. This paper reviews security concerns with content management systems (CMS), CMS attack metrics, and how organizations can protect websites built on a CMS platform
Tags : 
ibm, content management system, cms, platform
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, ponemon institute, ibm security qradar, siem
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: Zmags, Corp.     Published Date: Aug 11, 2010
Measuring the results of your digital magazines doesn't have to be complicated. This whitepaper introduces six key metrics that can help you understand how Zmags Analytics works, so you can see how successful your content is with your viewing audience.
Tags : 
zmags, measure, digital magazines, internet marketing, traditional marketing
    
Zmags, Corp.
Published By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : 
ibm, data, it security, data analytics
    
IBM
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.