bill com

Results 26 - 50 of 183Sort Results By: Published Date | Title | Company Name
Published By: Bloofusion     Published Date: Mar 01, 2010
Use the ten tough questions to quiz and help select your next SEO firm more effectively. Whether you are a CMO at billion dollar software firm or running your own online enterprise, at some point optimizing your site for discovery and favorable ranking by search engines for the terms that result in lead generation or purchase will become a priority.
Tags : 
bloofusion, ecommerce, url, ids, seo, cookie, optimization, tags, traffic
    
Bloofusion
Published By: Brightcove     Published Date: Sep 17, 2014
6 Billion hours of video are watched EACH MONTH on YouTube .... That's almost 1 HOUR for every person on Earth! There is no denying the power and reach of YouTube. But, are quality issues common with YouTube videos negatively impacting your brand? We investigate.
Tags : 
online video quality, consumer perception, distribution strategies
    
Brightcove
Published By: Bronto     Published Date: Feb 01, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: • How flexibility in choosing the number and time to send emails can increase engagement. • What to look for in the segmentation and personalization of cart recovery emails. • How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, cart recovery, online shopping, retail
    
Bronto
Published By: Bronto     Published Date: May 31, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: How flexibility in choosing the number and time to send emails can increase engagement. What to look for in the segmentation and personalization of cart recovery emails. How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, customer, consumer, revenue, recovery
    
Bronto
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The APM market is one of the largest subsegments of the IT operations management market, with 2016 revenue of approximately $3.7 billion and a growth rate exceeding 18% over the prior year. Given these statistics, it is no surprise that Gartner observes continuing investment. Interestingly, while Gartner has observed many new startups appearing on the radar screen, we've also seen large software organizations such as CA Technologies, IBM, Oracle and Microsoft (re)investing at the same time. Other non-APM companies are also expressing potential interest in the market — almost all of the current APM suite providers expect to see companies like Google and Amazon boost their primarily infrastructure monitoring capabilities with increased support for application visibility. Yet these (and other large) cloud companies will pose another challenge for the traditional APM players — the battle for talent acquisition. There is some concern within the APM market that highly skilled individuals may
Tags : 
ca technologies, monitoring, programs, applications
    
CA Technologies EMEA
Published By: CareCloud     Published Date: Jan 08, 2014
Learn How Medical Billing Companies Can Cut Costs and Boost Profits. In this free Medical Billing report you will learn: •How to improve first pass resolution rate •To ensure clients are paid contracted rates •How to manage documents more efficiently •Keys to optimize workflow and collections cycle •Better ways to manage data and reporting •Tips to go digital and more! Download this whitepaper to learn more!
Tags : 
medical billing, medical practices, workflow, gross margin, carecloud, information technology
    
CareCloud
Published By: CareCloud     Published Date: Jan 21, 2015
Watch this free webinar to hear how one general surgery practice increased billing by 11%, boosted revenue by 6% and streamlined productivity in just six months with its new practice management and EHR system. In this recorded webinar you will learn more about: •The biggest challenges to improving profitability and how to overcome them •How to increase productivity with your EHR •What the practice would have done differently—and how you can benefit from their experience •How to use your PM to improve profitability, productivity and more… Fill out the form on the right to begin watching this webinar right away!
Tags : 
carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation, access financial reports, access data, information technology
    
CareCloud
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"More than $1 million of e-commerce revenue is generated every 30 seconds, as millions of consumers purchase billions of products online. And these days, shopping is getting social. People aren’t just engaging on social media sites, but buying through them, too. As constant changes to mobile technology and e-commerce tools continue to reshape how consumers interact with brands and retailers, social commerce is here to stay. This white paper serves to help brands and retailers understand the state of social commerce today and its implications for connecting to customers, optimizing e-commerce operations and growing sales channels."
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, social commerce, social media, social advertising, facebook, instagram, paid social, marketing
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"With millions of sellers and billions of products to compete with on marketplaces, it’s easy to get buried in data every day — and still feel behind. And this is now true across almost all product verticals, as more and more niche categories become intense competitive battlegrounds. Shoppers know they have multiple options for purchasing the same item, and it’s no longer your product descriptions and images alone that capture attention. If you want to consistently rise to the top of results, a structured pricing strategy is a must. In this eBook, you’ll learn: - Complications of marketplace pricing - Benefits of strategic pricing - Pricing best practices - And more"
Tags : 
    
ChannelAdvisor
Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index™ (Cisco VNI™) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
Cisco Systems, with 75,000 employees and annual revenue of close to $50 billion, is a major multinational supplier of networking solutions. In addition to supplying networking solutions that businesses use to run their own datacenters, Cisco is constantly seeking to simplify and optimize its own IT infrastructure to make it more adaptable and innovative and to better provide itself with a competitive advantage.
Tags : 
applications, systems integration, cloud, development
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Since the 1990s, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate communications. Each day, more than 100 billion corporate email messages are exchanged.1 Security has naturally become a top priority. But mass spam campaigns are no longer the only security concern.
Tags : 
cisco, email threat, data, data security, information security, security, data management
    
Cisco
Published By: Cisco     Published Date: Sep 27, 2018
Blockchain, called the “tech breakthrough megatrend” by PWCą, is rapidly gaining broad acceptance. According to IDC, global spending on this innovative technology is expected to reach $2.1 billion in 2018.˛ Across the globe, industries are investigating ways to use blockchain to increase trust across their business value chains and address primary challenges around complexity, transparency, and security.
Tags : 
    
Cisco
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, financial services, client data protection, security risk
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security, anti virus
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: The common challenges of data security Steps to solve these challenges And much more
Tags : 
finance, data security, security risks, encryption
    
Citrix ShareFile
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
The benefits of moving manual processes to the web are well understood. But very few organizations have web-enabled product returns, bill disputes or other complex business processes. This paper discusses requirements for web-enabling complex processes.
Tags : 
self-service, self service, online processes, cost control, automation, broadvision, software development
    
Clearvale by BroadVision
Published By: Comcast Business     Published Date: Mar 24, 2015
Hotels and the travelers who frequent them bear little resemblance to their counterparts from just a few years ago. The explosion of new technologies has allowed hotels to change the way they operate and has made the average traveler more techsavvy and connected than ever. Mobile devices are driving this innovation. Not only have mobile devices changed how people interact with each other, they also have changed how people expect businesses to engage with them. According to SmartBrief, 40 percent of hotel guests carry three or more mobile devices. And with global mobile data traffic growing 30 percent every year according to Cisco, there will be an estimated 4.9 billion mobile users by 2018. When these mobile users travel, will they choose your hotel? Only if you have the mobile amenities they demand. In this white paper, we will review three mobile trends that every hotelier should address, and we’ll offer recommendations on how to best address them.
Tags : 
travel, hotel technology, mobile devices, mobile trends, hospitality, networking, it management, wireless
    
Comcast Business
Published By: Conductor     Published Date: Aug 20, 2013
Unsure of whether your organization should consider investing in an SEO platform? Curious to see if companies achieve significantly better natural search results from SEO technology? Read this case study to see how Searchlight, an enterprise SEO platform empowered HSN, Inc. a $3 billion multi-channel brand, to experience dramatic natural search results and maintain it's position as one of the top-10 most trafficked e-commerce sites. HSN's successful SEO milestones included: 1) Boost Page One Rankings by 24% 2) Design and create an actionable SEO roadmap 3) Seamlessly share deep natural search insights across 10 departments compared to none before
Tags : 
seo, -ecommerce, search engine optimization
    
Conductor
Published By: Coveo     Published Date: Nov 13, 2013
Where does a $5.5 billion technology company with 15,000 employees and a $1 billion annual R&D spend turn for a more effective way to tap existing research & engineering knowledge and avoid duplicating work? Harris Corporation turned to Coveo. read this case study to learn how Harris has improved productivity, communications and innovation.
Tags : 
advanced enterprise search, increasing productivity, knowledge assets, unified enterprise search, enterprise search solutions
    
Coveo
Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept