Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sign act

Results 576 - 600 of 929Sort Results By: Published Date | Title | Company Name
Published By: Location3     Published Date: Aug 31, 2018
About $3.7 trillion is spent annually in consumer purchases in the United States, according to Deloitte. But it’s often forgotten that only 8% of that is spent on e-commerce. This means that offline brick-and-mortar spending is where the true scale occurs. In order to support consistent franchise growth for your business, digital strategies must be designed to impact every stage of the franchising life cycle.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing
    
Location3
Published By: Location3     Published Date: Sep 04, 2018
Location3 client Mountain Mike’s Pizza and their franchisees face significant competitive challenges when advertising on Google, which ultimately requires the need to be both incredibly efficient with campaign setup and incredibly precise when managing bids and local budgets. A quick Google keyword search for “pizza near me” in Mountain Mike’s home state of California yields over 58,000,000 results (“pizza delivery” yields 56,000,000) and often features a predictable set of ad results from industry giants like Domino’s and Pizza Hut, among others. Suffice it to say that buying “pizza”-related terms in AdWords can get incredibly expensive, incredibly quickly, if a local franchisee’s budgets and bids are not managed with precision. When you combine that fact with limited location-level advertising budgets, our team atLocation3 was presented with a significant challenge in helping Mountain Mike’s Pizza generate increases in customer pizza orders while simultaneously ensuring that ad spen
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, mountain mike's pizza, paid search, us search awards, adwords, doubleclick
    
Location3
Published By: LogicNow     Published Date: Mar 10, 2016
Are you using the wrong RMM platform? How would you know? What are the signs to look for? Using the right RMM platform is critical to building a sustainable and profitable managed services practice – and we’ve got just the whitepaper to help.
Tags : 
logicnow, rmm p[atform, best practices, business technology
    
LogicNow
Published By: LogMeIn     Published Date: Oct 08, 2015
This paper reveals how Europeans have significantly increased their use of mobile as a channel to regularly perform both shopping and support functions, with particular spikes in growth in research and purchasing activities.
Tags : 
mobile engagement, mobile engagement in europe, mobility, mobile devices, use of mobile, online shopping
    
LogMeIn
Published By: LogRhythm     Published Date: Dec 20, 2016
For security analysts, a flow of security alerts is an inevitable consequence of the digital age. Moreover, as alerts can signal business-impacting incidents, the enterprise’s security staff cannot be complacent. Staff must be relentless in gathering logs, setting alert parameters, assessing alert severity, and then prudently responding to incidents with countermeasures.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Apr 04, 2017
The LogRhythm Labs™ Team (Labs Team) designed this report to provide actionable intelligence regarding threat actors and the tools, techniques, and procedures (TTPs) they use. Using this information, security operations center (SOC) analysts can better detect and respond to this specific threat.
Tags : 
    
LogRhythm
Published By: Looker     Published Date: Dec 03, 2015
Analytics is about so much more than defining high-level KPIs and building dashboards to amplify them. With a little creativity, you can create custom metrics designed to inform every member of an organization. With this knowledge of their effect on the business, everyone can optimize their impact on company-wide goals. What you'll learn in this webinar: • Why standard KPIs may not be getting you everything you need • Who can benefit from these new metrics (everyone!) • How to identify key metrics and roll them out to the entire organization • Get examples of how other companies are creating custom analytics
Tags : 
    
Looker
Published By: LTC Financial Partners     Published Date: Sep 24, 2009
The book contains seven chapters that cover tax advantages, multi-Life advantages, policy design, plan communication and implementation. The fact sheet will be an eye opener for any business owner. With stats like the annual cost to companies for workers lost productivity due to elder care responsibilities is estimated at $2,110.00 per employee, to the tune of 33.6 billion a year; a business owner cannot afford not to pay attention.
Tags : 
long term, financial, life, policy, tax, insurance
    
LTC Financial Partners
Published By: Lucidchart     Published Date: May 16, 2019
The sales industry has changed dramatically. Because prospects are more informed and more people (6.8, on average) have to sign off on a single purchase, sales reps have may find it difficult to close deals on their own. Cue the deal review. When executed correctly, deal reviews give sales reps that support they need—these meetings bring cross-functional teams together and leverage everyone’s experience and connections to move the account forward and shorten the sales cycle. When executed poorly, deal reviews reveal no new insights and waste time better spent on revenue-generating activities. In this e-book, you’ll learn how to standardize your deal reviews so they are efficient and insightful every time. Apply these strategies to: Quickly bring everyone up to speed on a deal’s status. Ensure that sales reps consistently provide the right information. Make sales reps more accountable for action items agreed upon in the deal review. Leverage executive connections.
Tags : 
    
Lucidchart
Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks
    
Lumension
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris
Published By: MaritzCX     Published Date: Nov 29, 2016
Learn and recognize the five signs that your financial customer is becoming a customer prospect. This paper will teach you the characteristics of customer prospects, how to win back and identify at-risk customers, identify patterns and predictive behaviors, and how to use your CX data to help you retain your customers.
Tags : 
maritzcx, cx strategies, customer experience, financial services, customer prospect
    
MaritzCX
Published By: Marketo     Published Date: Sep 03, 2019
Need a more significant ROI from your campaigns? Shift your thinking towards acquiring, retaining, and growing high-value accounts: companies or consumers that are high-yield and a better fit for your products or services. New channels, strategies, & technologies now help organizations of all sizes to implement an account-based marketing (ABM) strategy. Download Marketo's best-in-class Definitive Guide to Account-based Marketing and you'll learn: How to identify, prioritize, and profile the right accounts Creating a winning ABM strategy Creating the right content Which channels to leverage and how to coordinate them How to measure, analyse & optimize ABM campaigns What an ABM strategy that spans the entire customer lifecycle looks like in action
Tags : 
    
Marketo
Published By: Markforged     Published Date: Sep 14, 2018
Try Markforged's cloud-based 3D printing software today and see how you can turn your 3D CAD designs into high-strength, composite 3D printed parts for tooling and fixtures, functional prototyping, and custom, end-use production applications. After signing up here, you'll receive your activation email.
Tags : 
markforged, 3d printing, printing software, fiber, fiber configuration, infrastructure
    
Markforged
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications
    
MarkLogic
Published By: MarkLogic     Published Date: Sep 29, 2017
The clock is ticking: It’s time to future proof your data for MiFID II (and future regulations). Learn how to accelerate your MiFID II Compliance--within 30 days. Download our Quick Start Guide, designed to get you up and running with the major components and related processes for MiFID II, including an approach for building a fully integrated regulatory reporting solution. In the Quick Start Guide, we’ll cover: - What our consulting service can help you accomplish in 30 days - Key factors for your success - How we work - Why financial institutions trust MarkLogic for successful MiFID II implementations • CTA Button: o Get the Quick Start Guide
Tags : 
    
MarkLogic
Published By: MBG     Published Date: Aug 21, 2009
While overall costs for telecommunications services have been going down, the consumption of these services by corporations is on the rise. This white paper explores how corporations can manage the consumption of telecom services by implementing polices designed to impact behavior that can lead to lower costs.
Tags : 
phone, telecom, telecommunications, communications, it spending, cost control, phone bill, voip, voice over ip, mbg, mgb
    
MBG
Published By: McAfee     Published Date: Aug 14, 2014
Are you using the latest tools to guarantee your network survives an attack? Have you automated routine tasks, simplified upgrades and implemented plug-and-play deployment capability? Here are eight best practices for managing your network security.
Tags : 
firewall management, ngfw, next generation firewall, firewall resource, firewall staff, resource optimization, network security management, ngfw, security
    
McAfee
Published By: McAfee EMEA     Published Date: Mar 14, 2018
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new General Data Protection Regulation (GDPR)? Here are the concerns and strategies of 800+ senior executives from industries around the world. Data in a Turbulent World Nearly half of organizations say they will migrate data as a result of regulation or changing government policies. Data Protection as a Competitive Advantage A significant majority of respondents believe proper data protection will attract new customers. Download our full report, Beyond GDPR: Data residency insights from around the world.
Tags : 
    
McAfee EMEA
Published By: MediaVantage     Published Date: Sep 10, 2010
Social media has evolved from a platform designed for personal interaction to a powerful business communications tool. Our latest white paper looks at how social media can benefit your organization and how you can make it work for you.
Tags : 
mediavantage, social media, monitoring, public relations, strategy, investor relations
    
MediaVantage
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
High Density Interconnect (HDI) is being used more often to meet the growing need for more complex designs in smaller form factors. Beyond some of the more obvious electrical effects of using smaller vias, there is also an impact to the power integrity of a board using HDI. This includes different effects of mounted inductances of decoupling capacitors, changes in plane performance due to reduction in perforation from chip pinouts, and the inherent plane-capacitance changes from using dielectrics of various thicknesses. This paper will examine and quantify these effects, using numerous design examples, including a large conventional through-hole design board that was reduced using HDI.
Tags : 
power integrity effects, mentor graphics, high density interconnect, hdi, chip pinouts, perforation, multilayer or build-up multilayer, bum, sequential build-up technologies, sbu, buried via holes, bvhs, dielectric materials, photosensitive, laser drilling, plasma drilling, microvia, plated through-holes, pths, power distribution network
    
Mentor Graphics
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.