Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

over the top

Results 201 - 225 of 350Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Feb 11, 2019
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team. ResizedImage389253 dog with laptop lead generation You’ll learn how to: Define a lead and understand his or her buying journey Build a robust lead generation strategy t
Tags : 
    
Marketo
Published By: Comcast Business     Published Date: Mar 24, 2015
Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using Private Lines, Frame Relay or IP VPNs over the Internet. Ethernet services support hub and spoke topologies but also support an “any-to-any” network topology similar to a LAN but delivered over a wide area. This latter capability is unique to Ethernet services and cannot be cost effectively delivered using legacy point-to-point technologies such as Frame Relay or IP VPNs. This paper discusses two options for multi-site connectivity using Ethernet services. One option discusses the classical hub and spoke topology using Ethernet Virtual Private Lines (EVPL). The other option discusses the “any-to-any” topology using an Ethernet Private LAN (EP-LAN) service. Through examples, the paper illustrates the capabilities of the two approaches and their benefits.
Tags : 
multi-site connectivity, ethernet, security, ip transparency, performance, ep-lan, evpl, bandwidth management
    
Comcast Business
Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security
    
Comcast Business
Published By: Marketo     Published Date: Aug 29, 2016
Download this guide to discover what end-users say about Marketo, including: - Why Marketo is the only Marketing Automation product that is Top Rated across all three company size segments: small businesses, mid-sized companies,and enterprises - Strengths and areas for improvement with Marketo’s products - Marketo’s overall user ratings
Tags : 
marketo, marketing automation software, marketing
    
Marketo
Published By: Extreme Networks     Published Date: Sep 15, 2016
Here’s what is covered: - Overview of the rapid evolution of wireless LANs - The Ins and outs of Cloud-Managed Networking - The many benefits of a Cloud-Managed Network - Top considerations you need to know when evaluating solutions
Tags : 
extreme networks, networking, network, cloud, cloud networks, wireless, cloud managed networking, cloud based network
    
Extreme Networks
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Establishing a thriving business takes dedication and hard work, yet that can easily be destroyed without taking precautionary measures. To create more safety awareness, we’ve listed the top five vulnerabilities business owners face every day.
Tags : 
robbery, burglary, theft, liability, fire safety, vandalism, security
    
Tyco Integrated Security
Published By: Oracle     Published Date: Oct 22, 2015
Being the CIO of a retail business is no easy task, as evidenced by the high turnover rate. Much is asked of CIOs, perhaps too much. This eBook summarizes the top priorities every retail CIO should have on their radar. From Securing Data to Co-developing Consumer Journeys with the CMO, this eBook provides clear direction and actionable recommendations to get tech leaders started.
Tags : 
oracle retail, cio, retail business, consumer journeys, securing data
    
Oracle
Published By: Evident.io     Published Date: Sep 13, 2017
Evident Security Platform (ESP) captures over 10 billion AWS cloud events each month. These events affect organizations of all types- from large to small, to seasoned and beginner cloud AWS users. Using our risk engine, we analyze, prioritize, and categorize these events to discover what is going unchecked. The ebook “Top 10 AWS Security Risks,” explores the most common security mistakes that users make and discusses how to remediate these threats
Tags : 
    
Evident.io
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
This document defines Oracle’s Customer Experience (CX) Value Equation as the strategic method to identify and measure the value of organizational CX. This model was originally documented in “CX Metrics and KPIs – September 2012.” It has received wide support, and has been the #1 searched hit and downloaded CX KPI document for 3+ years – a significant achievement in this industry – in an era where concepts are replaced daily with the latest, greatest fad. Since the original publication, I have received significant feedback that has been overwhelmingly positive, but with a request to comment on additional topics – most notably: brand impact, shared services, and Oracle’s Road to Modern. This updated paper leverages the original work, adds information around these additional topics and incorporates our continued client experience.
Tags : 
oracle, service cloud, service management, customer interaction
    
Oracle Service Cloud
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
The days of ‘buyer beware’ are over. Today it’s ‘seller beware,’ as customers—empowered by technology—share their service experiences. That means every experience must be personalized and consistent across channels and throughout the customer journey. Get it right and you’ll be rewarded with increased revenues and lifelong customers. Get it wrong and 89% of customers will stop doing business with you after one bad experience. So how do you deliver the tailored, seamless service customers demand? Learn how Oracle delivers a complete, connected, stand-out customer service solution as compared with Salesforce.
Tags : 
salesforce, oracle, service cloud, customer interaction, customer engagement
    
Oracle Service Cloud
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
The days of ‘buyer beware’ are over. Today it’s ‘seller beware,’ as customers—empowered by technology—share their service experiences. That means every experience must be personalized and consistent across channels and throughout the customer journey. Get it right and you’ll be rewarded with increased revenues and lifelong customers. Get it wrong and 89% of customers will stop doing business with you after one bad experience. So how do you deliver the tailored, seamless service customers demand? Learn how Oracle delivers a complete, connected, stand-out customer service solution as compared with KANA.
Tags : 
customer interaction, customer service, oracle service cloud, kana
    
Oracle Service Cloud
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
The days of ‘buyer beware’ are over. Today it’s ‘seller beware,’ as customers—empowered by technology—share their service experiences. That means every experience must be personalized and consistent across channels and throughout the customer journey. Get it right and you’ll be rewarded with increased revenues and lifelong customers. Get it wrong and 89% of customers will stop doing business with you after one bad experience. So how do you deliver the tailored, seamless service customers demand? Learn how Oracle delivers a complete, connected, stand-out customer service solution as compared with eGain.
Tags : 
oracle, service cloud, customer interaction, customer service
    
Oracle Service Cloud
Published By: VMware and Dell EMC     Published Date: Oct 19, 2016
Discover the advantages of desktop and application virtualization with the VDI Starter Kit.
Tags : 
vmware, vdi, vmware horizon, hci, hyper-converged infrastructure, enterprise applications
    
VMware and Dell EMC
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The migration of contact centers from on-premises to the cloud is well underway and dramatically changing how companies deliver customer experience. That’s the conclusion of this 2016 survey by 8x8 and the Contact Center Network Group (CCNG) of 154 contact center professionals in the U.S. and UK. The November 2016 survey results uncover a range of trends and opportunities that highlight the importance of analytics, the increase in remote working, and the integration of more non-voice channels into the contact center. Download this complimentary report to learn: Major business drivers that are leading contact centers to cloud Surprising top method for measuring and improving agent performance Concerns and obstacles around moving to the cloud Increased prevalence of remote working and key challenges reported The most popular non-voice channels contact center managers would like to incorporate
Tags : 
cloud contact center, ccng, analytics. remote working, non-voice channels
    
8x8 Inc.
Published By: Tracx     Published Date: Mar 08, 2017
"The social internet is big, noisy, and always in flux — which makes it really hard to know where your audience is spending their time and how to reach them there. So, we've done the research for you. (You're welcome.) Join us for this on-demand webinar to learn why a ""listen-first"" philosophy sets your team up to discover game-changing opportunities before your competitors do. In this on-demand webinar, you'll learn: *How to create your ideal social media mix *The most up-to-date audience demographics from Facebook, Instragram, Twitter, Linkedin, Pinterest, Reddit, and more *Top performing networks based on industry demographics *When to adopt new networks (and when to ignore) *Where companies like yours spend time on social media (and where the missed opportunities are)."
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics
    
Tracx
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: Eaton     Published Date: Jul 12, 2019
Every three years, members of the National Fire Protection Association (NFPA) meet to review, modify and add new National Electrical Code (NEC), or NFPA 70, requirements to enhance electrical safety in the workplace and the home. This year’s code review is well underway: the second draft of NEC 2020 is complete and the annual NFPA Conference and Expo is scheduled for late June. What follows is a preview of what are, in my opinion, the most significant code changes on track to pass. In this blog, I’ll explore the reasoning for each change and the future steps the NEC may take beyond 2020 regarding: Ground fault circuit interrupter (GFCI) protection Service entrance equipment Reconditioned equipment Performance testing Load calculations Available fault current and temporary power This is a high-level overview. In the coming months, my Eaton colleagues and I will dig deeper into each topic as part of a continuing series on the 2020 code review cycle.
Tags : 
    
Eaton
Published By: Panasonic     Published Date: Mar 18, 2019
In a world of content overload, executives at Entertainment & Media companies know they need to find new ways to engage, enlighten and inspire audiences through cutting-edge spaces that overlay digital information onto the physical world. That’s what Panasonic, a leading innovator in 10 top disruptive technologies, found in its recent study. They asked senior technology decision makers across 13 industries how they are investing in new technologies, which they have already adopted and which they intend to implement. The report is available now to our readers. Get the report today for an inside look at how competitive companies are adopting disruptive technologies, innovating and planning for the future.
Tags : 
    
Panasonic
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper shall cover the following topics: What archiving is and how it integrates with Microsoft Exchange or a messaging solution; What stubbing is and why Microsoft does not recommend the use of stubbing; How Journaling in Exchange can allow efficient email archiving; How does stubbing compare with Journaling?
Tags : 
gfi, email archiving, compliance, microsoft exchange, messaging solution, microsoft, journaling
    
GFI Software
Published By: Adobe     Published Date: Sep 23, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. 4 KEYPOINTS Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to u
Tags : 
    
Adobe
Published By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : 
sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks
    
IBM
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses
    
ESET
Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.