RecruitingBlogscom

Follow Us:

 

abs

Results 401 - 425 of 492Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Dec 18, 2012
The growth in social media has overwhelmed many marketers. Things are moving so fast that many brand managers stay busy keeping tabs on the latest developments and trends, with little time to look at the mix of social media being put into the market.
Tags : 
oracle, crm, social media, customer marketing, crm & customer care
    
Oracle
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
International tätigen nur noch sieben Prozent1 der Verbraucher alle Weihnachtseinkäufe im traditionellen Einzelhandel. Neun von zehn Deutschen nutzen das Internet für einen Teil ihrer Weihnachts­einkäufe, jeder Dritte kauft sogar die Mehrheit seiner Geschenke dort.2 Das bedeutet, dass nur die wenigsten Händler noch auf den OnlineHandel verzichten können. Ob Gutscheine, Bestellungen zur Abholung in einer Filiale oder der inzwischen beinahe „klassische“ OnlineEinkauf: Ihre Kunden sind bereit, Ihren virtuellen Gabentisch reich mit Daten und Absatzchancen zu decken. Doch wer die WebsiteSicherheit vernachlässigt, muss stattdessen die Rute in Form von Hackerangriffen und verärgerten Kunden fürchten.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Ob Einzelperson oder Unternehmen: Sie sollten Ihre Online-Sicherheit ebenso ernst nehmen wie die physische Sicherheit zuhause oder im Unternehmen. Dadurch fühlen Sie sich nicht nur selbst sicherer; auch die Menschen, die Sie zuhause, im Büro oder auf Ihrer Website besuchen, werden geschützt. Um sicher zu gehen, dass Sie rundum geschützt sind, ist es für Sie wichtig, die potenziellen Risiken zu kennen. In der schnelllebigen Welt der Technologie ist es nicht immer leicht, mit den neuesten Entwicklungen Schritt zu halten. Deshalb ist eine Partnerschaft mit einem angesehenen Unternehmen für Internetsicherheit sehr sinnvoll. Dieser Leitfaden soll die eingesetzte Technologie entmystifizieren und Ihnen die Informationen bereitstellen, die Sie benötigen, um bei der Wahl Ihrer Online-Sicherheitslösung die bestmögliche Entscheidung zu treffen. Ein Glossar der verwendeten Begriffe finden Sie im Abschnitt "Technik verständlich erklärt" am Ende dieses Dokuments.
Tags : 
    
Symantec
Published By: ClickMail Marketing     Published Date: Sep 23, 2014
Most businesses stay with an ESP for only two years. Switching ESPs is costly, time-consuming and stressful. Wouldn’t you rather choose an ESP you can stick with for the long term? If your answer is “yes,” the 2014 ESP Selection Guide will help that happen.
Tags : 
clickmail, clickmail marketing, email marketing, email service provider, esp, emerging marketing
    
ClickMail Marketing
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: Maxaudience     Published Date: Oct 12, 2015
The value of hiring a full service marketing company is absolutely undeniable. Studies have shown that you can expect to see a growth revenue as high as 30% when you enlist the help of one of these companies, but that’s not true for every marketing company out there. Instead, you have to land with the right one to get results like that. Unfortunately, that’s not always as easy as it seems. Not only do you have to consider the type of ?rm you’re choosing, but the quality of the ?rm itself. Read the following for tips that can help when you are looking to change your marketing company!
Tags : 
full service marketing, growth revenue, marketing company, advertising agencies, marketing research
    
Maxaudience
Published By: Xactly Corp     Published Date: Jan 13, 2017
The number one driver of your organization’s success is sales performance. In this new eBook, 10 industry experts provide their top tips on how to inspire sales reps and maximize their selling power. With decades of sales management and training experience between them, they share proven practices to accelerate performance across your organization. You will learn how to: Improve coaching and training processes with weekly teaching labs and goal setting Motivate behaviors through incentives like SPIFs, bonuses, and recognition awards Build a better team culture by taking the time to personally connect with reps Increase rep productivity with practical advice you can start using today Don’t miss this guide on how you can incorporate continuous improvement and drive better performance. Download the eBook today!
Tags : 
sales, ebook, xactly, motivate, productivity, training, performance, selling
    
Xactly Corp
Published By: Absolute Software     Published Date: Dec 16, 2009
In this webinar, Jack Heine, Research VP, Gartner, and David Holyoak, CIO of accounting firm Grant Thornton, discuss how to facilitate mobility while minimizing the risk of data exposure using web-based management and anti-theft capabilities.
Tags : 
absolute, it security, mobile management, project management, mobility, mobile security, remote management
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 19, 2010
This whitepaper explains step-by-step how you can deploy a complete Snow Leopard disk image to a Mac OS X computer, even while it is being used. No immediate boot from a server, FireWire drive, or boot DVD is necessary, and no pre-configuration of the target computer is required.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
This IDC document presents highlights from the Adopting Mobility in the Enterprise Executive Roundtable held in New York City.
Tags : 
security, mobile, cloud, tablet, consumerization, business technology
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : 
byod, network security, mobile, security, policy, apple, end user, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
In the last four years, the number of Mac computers at Under Armour has quadrupled.
Tags : 
apple, asset management, end users, security
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user, security
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 02, 2013
The growing use of tablets, smartphones, and ultrabooks makes enpoint governance, risk management, and compliance (GRC) more challenging.
Tags : 
absolute software, grc strategy, adjust your endpoint, enpoint governance, security
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 10, 2013
Mobile diversity and employee demand drive growth in Byod programs
Tags : 
business technology
    
Absolute Software
Published By: Schneider Electric     Published Date: May 03, 2018
The industry of tomorrow will be different. More volatile markets, new technology capabilities, and increased pressure on performance will precipitate the change. But with change comes opportunity…the Industrial Internet of Things (IIoT) has unleashed huge potential for industrial customers. There is a reported $14 trillion of new business growth up for grabs – and your goal of better business performance can help you earn your fair share of that growth. How can you make the most of this potential? Read the rest of this eBook to learn more.
Tags : 
vsd, vfd, variable speed drives, variable frequency drives, iiot, water, wastewater, oil & gas, pumping, mining, drives, service, industrial automation, cybersecurity, achilles, food & beverage
    
Schneider Electric
Published By: Groundwork Open Source     Published Date: Aug 21, 2009
IT teams have long recognized that an enterprise-class IT management system is absolutely essential, especially given the mission-critical nature of most corporate IT networks. In order for robust IT monitoring and management functionality, they had no alternative but to use a proprietary solution. Download this white paper to learn about Open Source alternatives.
Tags : 
open source, network management, openview, open view, monitoring, open source network, open source networks, groundwork, groundwork open source
    
Groundwork Open Source
Published By: KACE     Published Date: Nov 14, 2006
This paper explores how Appliance-based Software Delivery (AbSD) provides a better alternative to both software and Software as a Service (SaaS).
Tags : 
appliance, network security, saas, absd, hosted model, on-demand model, software development, value-add, value-added, security appliance, kace, it management, enterprise applications, platforms
    
KACE
Published By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : 
virtualization, data center, data centers, datacenters, resource management, it management, network management, virtual, virtual storage, neterion, networking
    
Neterion
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Efficient fleet maintenance is absolutely necessary given today's high equipment costs and climbing operating expenses. Whether you are involved in LTL, cartage, courier, direct store delivery (DSD) or field service operations, an integrated and cost effective fleet maintenance program is a prerequisite to increased profitability.
Tags : 
rfid, rfid tags, automotive, trucking, fleet management, fleet maintenance, wireless data systems, wireless hardware, gao, gao group, gao rfid
    
GAO RFID Inc.
Published By: AKS-Labs     Published Date: Mar 20, 2007
Business professionals lack essential information about real-life metrics and information on how to build a Balanced Scorecard, which supports weights and scores, which allows calculating the performance values. This whitepaper is a Balanced Scorecard design toolkit, which contains some "how-to" ideas.
Tags : 
balanced scorecard, business analytics, business metrics, business intelligence, business integration, customer satisfaction, enterprise resource planning, scorecard, aks-labs, aks labs
    
AKS-Labs
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
In 2004, J.W. Childs had the opportunity to acquire the Sunny Delight Beverage Co. (SDBC) through a unique carve-out of brands by Procter & Gamble. An accurate and in-depth assessment of the infrastructure required to support SunnyD’s business going forward would be absolutely essential to Childs’ decision to purchase the company.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, jw childs, j.w. childs, sunny d, sunny delight, acquisition, buyout, enterprise resource planning, outsourcing, governance, outsource, it management
    
OneNeck IT Services
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top