Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

attention

Results 151 - 175 of 264Sort Results By: Published Date | Title | Company Name
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This eBook provides an overview of the science behind mindfulness meditation and highlights why it’s captured the attention of top executives across the globe. It’s intended for people who are not only interested in the health and performance benefits of mindfulness, but also want the proof points... just like us.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Published By: Qualys     Published Date: Nov 05, 2013
Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.
Tags : 
qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability, browser security, network security
    
Qualys
Published By: craftersoftware     Published Date: Sep 19, 2013
Attention Java Developers: Learn how to build content rich enterprise websites with the most modern Java development tools and Web CMS
Tags : 
    
craftersoftware
Published By: VMware AirWatch     Published Date: May 19, 2016
We work at home. We take conference calls in the backseat of a taxi. We even tap out emails from 30,000 feet. Mobility is radically redefining the way we work, because it’s redefining where and when we can work. It’s why Keith Perske, executive managing director of workplace innovation for Collier’s, thinks it’s time to adopt a new description of the workplace: “Today’s workplace is an integrated set of locations, technology, programs and work practices that connect people and enable employees to contribute and be productive. That’s the new workplace definition.” And with the emergence of this modern workplace, users are expecting a mobile experience that’s simple, convenient, and a boon to their productivity. In order to deliver on these expectations, IT organizations are making business mobility a priority in their investment decisions. Which is why we’ve identified five potent mobility trends that warrant attention and also present opportunities to transform the enterprise
Tags : 
technology, innovation, work practices, best practices, mobility, trends
    
VMware AirWatch
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : 
it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
    
Alcatel Lucent Enterprise
Published By: FunMobility     Published Date: Aug 21, 2012
Going mobile can be challenging. "Beyond Check-ins, Mobile Strategies for the Future of Retail" will give insight on how marketers can capture consumers' attention and loyalty using mobile engagement. Over 40% of shoppers carry a smartphone in retail environments, which offers brands the opportunity to interact with customers beyond their brick and mortar stores. Find out how brands, CPGs and retailers can add real value to their customers' retail shopping experience.
Tags : 
crm, customer engagement, mobile, mobile strategy, webinar
    
FunMobility
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In a free audio/video Webcast with MarketingSherpa’s Anne Holland, learn valuable, tested B-to-B marketing tips, including how to stop spending too much on SEM while making your remaining SEM budget work harder... how to make prospects pay attention to your content... the key difference between case studies and success stories... when—and why—you should consider removing the registration page... and more.  Don’t miss these proven tips—watch the free 30-minute Webcast now.
Tags : 
promo code: wp3, marketing sherpa, marketingsherpa, b-to-b, b2b, b-to-b marketing, b2b marketing, marketing budget, lead generation, demand generation, direct marketing, lead conversion, registration page, registration, landing page, white paper, content, sem, search engine marketing, search marketing
    
Marketo, INC.
Published By: QuinStreet     Published Date: Feb 05, 2009
As the world continues to analyze energy availability and the long-term effects of climate change, businesses too are turning their attention to an area of opportunity—reduction of carbon emissions, energy conservation and supply chain sustainability. Many businesses are finding that these initiatives go beyond simple good-citizenship to real business opportunities and bottom line savings that can contribute financial value to the organization while meeting demanding customer requirements. Join Today!
Tags : 
quinstreet, csr, corporate social responsibility, globalization, product lifecycle management, plm, performance management, performance measurement, it management, green computing
    
QuinStreet
Published By: Cornerstone OnDemand     Published Date: Mar 31, 2011
The challenge with being a consistent performer is, while they typically get more work done, they get less attention from their managers, and they have fewer professional opportunities available to them.
Tags : 
performance management, talent mobility, cornerstone ondemand, saas, talent management, human capital management, hcm
    
Cornerstone OnDemand
Published By: GoToWebinar     Published Date: Oct 08, 2013
We've all grown used to ordinary customer experiences, so when something extraordinary happens, we pay attention. No matter whether your business is a one-person show just getting started or a multi-national corporation, whether you are a front-line worker or a top-level executive, you can create awesome. This brief by Scott Stratten, best-selling author and president of UnMarketing, shares stories that’ll inspire you to find your own unique brand of business awesome.
Tags : 
marketing, scott stratten, good to awesome, citrix, go to meeting, the book of business awesome
    
GoToWebinar
Published By: SAS     Published Date: Apr 25, 2017
The Internet of Things (IoT) – devices and sensors connected to computing systems and networks – has received enormous attention in the last few years. The attention is due, in part, to the proliferation of connected devices, from about a million in the early 1990s to more than five billion today. In addition, the technology for connecting the devices has become more affordable and easier to integrate.
Tags : 
    
SAS
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: Mass Relevance     Published Date: Jun 12, 2014
Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. View social sponsorship best practices for live events, on-air promotion, and website integration plus case studies from networks, agencies, and sponsors. Don't miss how the 25th annual College Slam sponsor Denny's drove 60,000 tweets during ESPN's live broadcast.
Tags : 
sponsorship offerings, sports sponsorship, on-air promotion, and website integration, networking
    
Mass Relevance
Published By: IBM     Published Date: Jan 06, 2016
In light of such popularity, many organizations are turning their attention to mobile recruiting. So, how do job seekers use mobile devices in their job searches? Using data from the global IBM WorkTrendsTM survey, the IBM Smarter Workforce Institute (SWI) analyzed why and how potential job seekers use mobile in their job searches and what concerns and expectations they have. The results provide organizations with clear insights into how they can attract talent via mobile technologies.
Tags : 
ibm, mobile recruitment, recruitment, mobile devices, smarter workforce institute, attracting talent
    
IBM
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Mar 28, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs? To better understand what companies are doing in the area of employee listening and the extent to which employees are willing to participate, we analyzed data from the 2015 IBM Smarter Workforce Institute WorkTrends Survey – a broad-based survey of ov
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement, human resource technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs?
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement, human resource technology
    
IBM
Published By: Mintigo     Published Date: Nov 20, 2017
What is ABM and why is it so cool? Rarely do new trends catch the attention of marketers with the velocity and intensity of Account Based Marketing (ABM). So what is ABM and how should marketing and sales executives strategically evaluate an ABM program for their organization? The definition of ABM is: The systematic process to use data and intelligence to discover, identify, segment, target, engage and win business.
Tags : 
    
Mintigo
Published By: SAP     Published Date: Jan 19, 2010
Your information can be one of your greatest assets - helping you stay on top of regulatory requirements, close to customers, and ahead of the competition. Organizations that pay attention to their data will be the ones to survive and thrive. So how do you obtain a complete view of your information when it is scattered across silos? Or integrate data from structured and unstructured data sources? Or help reduce the risk of inaccurate reporting? And how do you manage your information more effectively to help keep costs from spiraling out of control?
Tags : 
sap, eim, enterprise information management, erp, crm, etl
    
SAP
Published By: Oracle     Published Date: Apr 28, 2014
Is innovation getting the right attention at your company?
Tags : 
oracle, innovation, innovation management
    
Oracle
Published By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
    
SAS
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection, spear phishing, phishing, spam, virus, malware, hackers, cyber criminals, internet security, network security
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.