Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

gen

Results 176 - 200 of 7054Sort Results By: Published Date | Title | Company Name
Published By: Blue Jeans Network     Published Date: Jan 29, 2014
Download this whitepaper to learn how you can improve recruiting, training and productivity with video conferencing.
Tags : 
video conferencing, recruiting, training, increasing productivity, talent management
    
Blue Jeans Network
Published By: The Starr Conspiracy     Published Date: Sep 19, 2017
It doesn’t matter if your goals involve brand awareness, functional association, or demand generation. Brands that fail to integrate an earned media strategy with paid and owned media strategies are missing key opportunities to influence the buyer’s journey. If you ignore earned media channels, you do so at the risk of missing that ideal customer. In this white paper, we’ll outline the top three reasons you need an integrated approach — that includes PR — to achieve great brand awareness
Tags : 
    
The Starr Conspiracy
Published By: Cherwell Software     Published Date: Sep 22, 2015
This ebook provides three concrete methods for keeping modern IT departments cutting edge and competitive.
Tags : 
application management, business intelligence analytics, business process management (bpm), contact center solutions, customer service best practices
    
Cherwell Software
Published By: Marchex     Published Date: Nov 11, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : 
marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
    
Marchex
Published By: Limelight Networks     Published Date: Jul 01, 2011
Create your own tablet-worthy site, and make your marketing work harder. This report shows you how to: . Take advantage of the tablet as a high-end media experience . Create experiences that support unique tablet behavior . Increase engagement by leveraging user-generated content
Tags : 
mobile marketing, tablet-worthy site, mobile website, ipad site, limelight networks, content delivery, content delivery network, cdn, cdn network, limelight website, limelight networks inc, content delivery networks, content delivery network services, cdn services
    
Limelight Networks
Published By: White Horse     Published Date: Aug 19, 2010
As an industry, our ability to seize the potential for social media for lead generation is stifled by one thing: an outdated mindset. We still think advertising is advertising and social media is something else. In fact, advertising and social media are the same thing: they're content. The moment we realize that all marketing is content, we can break through the campaign mindset and find new ways to fuel powerful brand interactions-the kind that fuel transactions. In this white paper, you'll learn about several ways to transform your Web site into a lead generation machine with distributed content marketing.
Tags : 
white horse, b2b, redesign, content marketing, decentralize, engagement, template, leads, lead generation, lead gen, sales leads, crm, sales
    
White Horse
Published By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
    
IBM
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: InfusionSoft     Published Date: Apr 07, 2011
Infusionsoft, the Leader in Marketing Automation Software has created a simple Guidebook to help business owners navigate online growth.
Tags : 
internet marketing, infusionsoft, small business success, website effectiveness, traffic generation, list building, contact management, e-mail marketing
    
InfusionSoft
Published By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : 
ugc, user generated content, revenue, curalate, social media, millenials
    
Curalate
Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility
Published By: SAP     Published Date: May 18, 2014
From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a true 360-degree perspective on SAP HANA.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Intermec     Published Date: Sep 07, 2011
Smart printers enable businesses to change the way their printing operations are structured, to streamline and improve processes in ways that reduce operating costs while improving reliability.
Tags : 
intermec, wireless, cellular technology, third generation, application capability
    
Intermec
Published By: 3M     Published Date: Mar 19, 2019
3M acts as a partner in preparedness for all Healthcare and Emergency professionals. Download this guide to learn more.
Tags : 
    
3M
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Intel® CoreT vProT Processor Comparison provides a Good, Better, Best guide for selecting the best processors to power your business PCs
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation, data center
    
Intel
Published By: HP & Intel     Published Date: Sep 18, 2012
Whether your goal is to improve security, cut costs, maximize data protection, or improve worker productivity, the 3rd generation Intel® CoreT processor family is built for business and engineered for security.
Tags : 
intel, security management, data protection, desktop performance, desktop virtualization, security
    
HP & Intel
Published By: Intel Corp.     Published Date: Jul 09, 2012
Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® CoreT vProT processor overview.
Tags : 
intel, 3rd generation, core vpro
    
Intel Corp.
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology, security, it management
    
EMC Corporation
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
    
Canon Solutions America
Published By: Dell Server     Published Date: Aug 24, 2018
La computación periférica pronto se convertirá en la nueva norma, a medida que entramos en una era de zettabytes y miles de millones de dispositivos conectados. Los servidores PowerEdge de Dell EMC están diseńados de forma única para cumplir las exigencias de la computación periférica con seguridad integrada, escalabilidad sin concesiones y automatizado inteligente.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 24, 2018
Edge computing will soon become the new norm as we enter the era of zettabytes and billions of connected devices. Dell EMC PowerEdge servers are uniquely designed to meet the demands of edge computing with integrated security, no-compromise scalability and intelligent automation.
Tags : 
    
Dell Server
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shopkeepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, marketing opportunity
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.