Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web ui

Results 351 - 375 of 621Sort Results By: Published Date | Title | Company Name
Published By: White Horse     Published Date: Oct 07, 2009
Learn how to tap powerful real-time brand conversations taking place in social media by investing in the proper tool to aggregate and share the data across your organization. Download this Webinar for a standards-based benchmarking review of the top social media monitoring tools and practical knowledge that will equip you to make a business case for the single best social media investment.
Tags : 
brand marketing, brand research, social media monitoring, crisis management, social marketing, brand management
    
White Horse
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : 
social media, business insights, social media insights, social networks, consumer behavior
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : 
bazaarvoice, business results, business insights, social segmentation, product innovation, consumer research, product enhancements, product performance, customer preferences, product catalog
    
Bazaarvoice
Published By: GoToWebinar     Published Date: Aug 01, 2011
Watch this on-demand webinar to hear pioneer presentation innovator Nancy Duarte, CEO of Duarte Design, demonstrate how to apply the methods in her book, Resonate: Presenting Visual Stories That Transform Audiences, to build meaningful connections with audiences that compel them to action. Her groundbreaking work details a new way of structuring presentations that helps the presenter create a human connection with audiences.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This Webinar Success white paper provides guidelines on how to produce and manage successful Webinars - from the first (and most important) step of defining purpose and expectations to quantifying results after the event.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Oct 08, 2013
There are a few simple things you can do before, during and after a webinar that will leave your attendees talking for days. If you want to have a lively event, get the conversation started early. This brief provides an easy step-by-step guide that will make your online event more engaging, valuable and effective.
Tags : 
citirx, whitepaper, go to webinar, citrix, webinar preparation
    
GoToWebinar
Published By: GoToWebinar     Published Date: Oct 08, 2013
Let’s face it: it’s competitive out there in the content marketing crowd. You need a strong content strategy to help you stand out. Building a plan that places webinars at the hub of your marketing is the most sensible approach to spurring growth both now and in the future. This DemandGen report explores how you can leverage webinars to generate a large and loyal following.
Tags : 
content strategy, webinars, demandgen, white paper, marketing, content marketing, content marketing hub, build
    
GoToWebinar
Published By: Webtrends     Published Date: Apr 21, 2010
Change the way you approach customer targeting forever. Segments is a new add on to Webtrends Visitor Data Mart that makes building a customer segment drag-and-drop simple. Use it to quickly explore your data and uncover new targeting opportunities. And then easily export your segment to the marketing tool of your choice.
Tags : 
webtrends, targeting, data mart, marketing tools, segmentation, segments
    
Webtrends
Published By: Moreover Technologies     Published Date: Mar 10, 2011
Learn all about the Web's most far-reaching and time-tested global news and social media aggregator. It's only one quick form and a mouse click away.
Tags : 
demo, social media, enterprise, software, free solution
    
Moreover Technologies
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: IBM     Published Date: Oct 01, 2012
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment.
Tags : 
intranet, web experiences, customer experience, web content management, content delivery
    
IBM
Published By: iCIMS     Published Date: Sep 30, 2013
Don't let hard-to-fill-positions ruin your productivity! View this webinar to gain insights from recent BLS data, learn tactics for finding and attracting hard-to-find candidates, and understand the importance of using a uniquely branded career portal in the recruiting process.
Tags : 
icims, talent management, hiring, new employees, hiring, new jobs, recruiting talent
    
iCIMS
Published By: iCIMS     Published Date: Sep 30, 2013
Check out this iCIMS webcast to understand firsthand how to track your recruitment efforts, improve hiring manager engagement, and counteract traditional HR painpoints. Become your company's HR Hero and turn HR into a profit center by knowing and tracking key metrics for long-term ROI.
Tags : 
icims, recruitment metrics, recruitment, new jobs, job seekers, new employees, new hire
    
iCIMS
Published By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : 
icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues, hr trends, screen employees
    
iCIMS
Published By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : 
silver peak, network memory, application caching, wan, caching, networking
    
Silver Peak
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Oracle     Published Date: Nov 27, 2013
According to Forrester, 72% of customers prefer using a company’s Website to answer their questions. But only 52.4% find the information they need online. Customers want to solve their issues quickly and easily on the Web. When they can, they are likely to buy more, with 88% saying they will increase their spending. Download this White Paper for more information.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management
    
Oracle
Published By: Oracle     Published Date: Nov 27, 2013
According to Forrester, 72% of customers prefer using a company’s Website to answer their questions. But only 52.4% find the information they need online. Customers want to solve their issues quickly and easily on the Web. When they can, they are likely to buy more, with 88% saying they will increase their spending. Download this White Paper for more information.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management
    
Oracle
Published By: Cisco     Published Date: Jan 16, 2014
Cloud Web Security Using Cisco ASA Technology Design Guide
Tags : 
cisco, cloud web security, security, cisco asa, cvd, cisco asa technology
    
Cisco
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management, security
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
Published By: Dyn     Published Date: Sep 10, 2015
We get it - all this talk about Internet infrastructure, cloud infrastructure optimization and Internet Performance can be overwhelming. To help untangle the “web” of confusion, we partnered with the pioneers of making the confusing simple, Wiley, to create the Internet Performance for Dummies guide.
Tags : 
dyn, web, dummies, wiley, internet, performance, internet performance, cloud, infrastructure, networking, it management, enterprise applications
    
Dyn
Published By: Marketo     Published Date: Mar 13, 2014
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, The Definitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team.
Tags : 
marketo, lead generation, defining a lead, seo, landing pages, social media, email marketing, middle of the funnel, optimization, metrics, testing
    
Marketo
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions, security, it management
    
Alert Logic and Rackspace
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.